Curriculum
-
1
Book Preview
-
2
Introduction
-
(Included in full purchase)
Introduction
-
(Included in full purchase)
-
3
Chapter 1 : Introduction to Web Authentication
-
(Included in full purchase)
Introduction to Web Authentication
-
(Included in full purchase)
-
4
Chapter 2 : Fundamentals of Cryptography
-
(Included in full purchase)
Fundamentals of Cryptography
-
(Included in full purchase)
-
5
Chapter 3 : Authentication with Network Security
-
(Included in full purchase)
Authentication with Network Security
-
(Included in full purchase)
-
6
Chapter 4 : Federated Authentication-I
-
(Included in full purchase)
Federated Authentication-I
-
(Included in full purchase)
-
7
Chapter 5 : Federated Authentication-II (OAuth and OIDC)
-
(Included in full purchase)
Federated Authentication-II (OAuth and OIDC)
-
(Included in full purchase)
-
8
Chapter 6 : Multifactor Authentication
-
(Included in full purchase)
Multifactor Authentication
-
(Included in full purchase)
-
9
Chapter 7 : Advanced Trends in Authentication
-
(Included in full purchase)
Advanced Trends in Authentication
-
(Included in full purchase)
-
10
Appendix A: The Go Programming Language Reference
-
(Included in full purchase)
Appendix A: The Go Programming Language Reference
-
(Included in full purchase)
-
11
Appendix B: The Flutter Application Framework
-
(Included in full purchase)
Appendix B: The Flutter Application Framework
-
(Included in full purchase)
-
12
Appendix C: TLS Certificate Creation
-
(Included in full purchase)
Appendix C: TLS Certificate Creation
-
(Included in full purchase)
-
13
Index
-
(Included in full purchase)
Index
-
(Included in full purchase)
About the course
In today's digital landscape, web apps evolve rapidly, demanding enhanced security. This Ultimate Web Authentication Handbook offers a comprehensive journey into this realm. Beginning with web authentication basics, it builds a strong foundation. You'll explore cryptography fundamentals, essential for secure authentication. The book delves into the connection between authentication and network security, mastering federated authentication via OAuth and OIDC protocols. You'll also harness multi factor authentication's power and stay updated on advanced trends. The book expands on deepening your understanding of Java Web Token (JWT), FIDO 2, WebAuthn, and biometric authentication to fortify web apps against multifaceted threats. Moreover, you'll learn to use Identity and Access Management (IAM) solutions for constructing highly secure systems. Whether you're a developer, security enthusiast, or simply curious about web security, this book unlocks the secrets of secure online interactions.
.jpg)
About the Author
Sambit Kumar Dash has been managing and building products for over 25 years, with interests in law, cybersecurity, and AI. He has eight patents in document technologies, computer security, virtualization, and human-computer interfaces. He provides product management consultancy to organizations through his venture Lenatics Solutions Pvt. Ltd.