Part IV. Elective: Data Security

Table of Contents
39. Data Security Intro
39.1. References for this Part
39.2. Overview
40. Data Security I - Basic Encryption
40.1. References for this Lesson
40.2. Long Quote from [Aum18], Our Excellent Textbook
40.3. Frequency Analysis
40.4. One Time Pads - Unbreakable Encryption
40.5. Assignments Security - DS.1
41. Data Security II - Encryption - TLS
41.1. References for this Lesson
41.2. Most Recent Weeks Assignments, Model Solutions
41.3. Whatis?
41.4. Encryption
41.5. TLS, Transport Layer Security
41.6. Assignments Security Theory - Encryption
42. Data Security III - Hashing
42.1. References for this Lesson
42.2. Most Recent Weeks Assignments, Model Solutions
42.3. Hashing
42.4. Assignments Security Theory 3
43. Data Security IV - OWASP, Injection, XSS
43.1. References for this Lesson
43.2. Most Recent Weeks Assignments, Model Solutions
43.3. Injections - Create a Situation
43.4. Injections - Demo 0, SQL Injection
43.5. Injections - Discussion of Demo 0
43.6. Injections - Handling the Situation
43.7. Assignments Security Theory 4
44. Data Security V - Recap Techie, GDPR
44.1. References for this Lesson
44.2. Most Recent Weeks Assignments, Model Solutions
44.3. GDPR, Law, not Tech
44.4. Outstanding Techie Issues
44.5. Prepared Statements with PHPs PDO Module
44.6. Singleton, PDO Examples
44.7. Singleton, MySQLi Examples
44.8. Assignments Security Theory 5
45. Application Security, Intro
45.1. References for this Lesson
45.2. Most Recent Lesson's Assignments
45.3. Adding Security to Schema and Models
45.4. Assignments Security AS.0
46. Application Security, Access
46.1. References for this Lesson
46.2. Most Recent Lesson's Assignments
46.3. Authentication
46.4. Assignments Security AS.1
47. Application Security, Node Middleware
47.1. References for this Lesson
47.2. Most Recent Lesson's Assignments
47.3. What to Do Today?
47.4. Assignments Security AS.2
48. Application Security, Authentication Strategies - Local
48.1. References for this Lesson
48.2. Most Recent Lesson's Assignments
48.3. Preparation
48.4. Strategies Generally with Passport
48.5. Implementation of Local Strategy
48.6. Assignments Security AS.3
49. Application Security More Strategies - OAuth2
49.1. References for this Lesson
49.2. Most Recent Lesson's Assignments
49.3. OAuth, Currently Oauth2
49.4. Assignments Security AS.4
50. Application Security, Loose Ends
50.1. References for this Lesson
50.2. Most Recent Lesson's Assignments
50.3. 2FA, Two Factor Authentication
50.4. Logging. Server and Application
50.5. Injections, SQL, and Others
50.6. Helmet - A Security Helmet
50.7. Assignments Security AS.5