Part IV. Elective: Data Security
Table of Contents
- 39. Data Security Intro
- 39.1. References for this Part
- 39.2. Overview
- 40. Data Security I - Basic Encryption
- 40.1. References for this Lesson
- 40.2. Long Quote from [Aum18], Our Excellent Textbook
- 40.3. Frequency Analysis
- 40.4. One Time Pads - Unbreakable Encryption
- 40.5. Assignments Security - DS.1
- 41. Data Security II - Encryption - TLS
- 41.1. References for this Lesson
- 41.2. Most Recent Weeks Assignments, Model Solutions
- 41.3. Whatis?
- 41.4. Encryption
- 41.5. TLS, Transport Layer Security
- 41.6. Assignments Security Theory - Encryption
- 42. Data Security III - Hashing
- 42.1. References for this Lesson
- 42.2. Most Recent Weeks Assignments, Model Solutions
- 42.3. Hashing
- 42.4. Assignments Security Theory 3
- 43. Data Security IV - OWASP, Injection, XSS
- 43.1. References for this Lesson
- 43.2. Most Recent Weeks Assignments, Model Solutions
- 43.3. Injections - Create a Situation
- 43.4. Injections - Demo 0, SQL Injection
- 43.5. Injections - Discussion of Demo 0
- 43.6. Injections - Handling the Situation
- 43.7. Assignments Security Theory 4
- 44. Data Security V - Recap Techie, GDPR
- 44.1. References for this Lesson
- 44.2. Most Recent Weeks Assignments, Model Solutions
- 44.3. GDPR, Law, not Tech
- 44.4. Outstanding Techie Issues
- 44.5. Prepared Statements with PHPs PDO Module
- 44.6. Singleton, PDO Examples
- 44.7. Singleton, MySQLi Examples
- 44.8. Assignments Security Theory 5
- 45. Application Security, Intro
- 45.1. References for this Lesson
- 45.2. Most Recent Lesson's Assignments
- 45.3. Adding Security to Schema and Models
- 45.4. Assignments Security AS.0
- 46. Application Security, Access
- 46.1. References for this Lesson
- 46.2. Most Recent Lesson's Assignments
- 46.3. Authentication
- 46.4. Assignments Security AS.1
- 47. Application Security, Node Middleware
- 47.1. References for this Lesson
- 47.2. Most Recent Lesson's Assignments
- 47.3. What to Do Today?
- 47.4. Assignments Security AS.2
- 48. Application Security, Authentication Strategies - Local
- 48.1. References for this Lesson
- 48.2. Most Recent Lesson's Assignments
- 48.3. Preparation
- 48.4. Strategies Generally with Passport
- 48.5. Implementation of Local Strategy
- 48.6. Assignments Security AS.3
- 49. Application Security More Strategies - OAuth2
- 49.1. References for this Lesson
- 49.2. Most Recent Lesson's Assignments
- 49.3. OAuth, Currently Oauth2
- 49.4. Assignments Security AS.4
- 50. Application Security, Loose Ends
- 50.1. References for this Lesson
- 50.2. Most Recent Lesson's Assignments
- 50.3. 2FA, Two Factor Authentication
- 50.4. Logging. Server and Application
- 50.5. Injections, SQL, and Others
- 50.6. Helmet - A Security Helmet
- 50.7. Assignments Security AS.5