Access Control, Authentication

A Guide to Claims-Based Identity and Access Control: Authentication and Authorization for Services and the Web (2nd edition) (R

A Guide to Claims-Based Identity and Access Control: Authentication and Authorization for Services and the Web (2nd edition) By Dominick Baier
2013 | 410 Pages | ISBN: 1621140024 | PDF | 21 MB
A Guide to Claims-Based Identity and Access Control: Authentication and Authorization for Services and the Web

A Guide to Claims-Based Identity and Access Control: Authentication and Authorization for Services and the Web By Dominick Baier
2013 | 410 Pages | ISBN: 1621140024 | PDF | 21 MB

CompTIA Security+ Exam Prep (SY0-401): Access Control and Identity Management  eBooks & eLearning

Posted by naag at April 14, 2016
CompTIA Security+ Exam Prep (SY0-401): Access Control and Identity Management

CompTIA Security+ Exam Prep (SY0-401): Access Control and Identity Management
MP4 | Video: AVC 1280x720 | Audio: AAC 48KHz 2ch | Duration: 1H 16M | 222 MB
Genre: eLearning | Language: English

Get the training you need to pass the CompTIA Security+ exam. This course covers the access control and identity domain of the test. By learning about concepts such as identification, authorization, authentication, and secure account management practices, you'll be prepared to answer some of the most challenging questions from the Security+ exam.
Pluralsight - Identity and Access Control in ASP.NET 4.5

Pluralsight - Identity and Access Control in ASP.NET 4.5
MP4 | Video: 1024x768 | 128 kbps | 44 KHz | Duration: 3h 20m | 406 MB
Genre: eLearning | Language: English

Implementing claims-based identity, federation, authentication & authorization in ASP.NET 4.5
Lynda - CompTIA Security+ Exam Prep (SY0-401): Access Control and Identity Management

Lynda - CompTIA Security+ Exam Prep (SY0-401): Access Control and Identity Management
Size: 222MB | Duration: 1h 17m | Video: AVC (.mp4) 1280x720 30fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Level: Intermediate | Language: English

Get the training you need to pass the CompTIA Security+ exam. This course covers the access control and identity domain of the test. By learning about concepts such as identification, authorization, authentication, and secure account management practices, you'll be prepared to answer some of the most challenging questions from the Security+ exam.

pluralsight - Windows Azure Access Control Service  

Posted by Polik88 at June 6, 2013
pluralsight - Windows Azure Access Control Service

pluralsight - Windows Azure Access Control Service
English | WMV | 1024x768 | VC-1 46.8 Kbps 15.000 fps | WMA 128 Kbps 44.1 khz | 2 channels | 294 MB
Genre: Video Training

The Windows Azure Access Control Service (ACS) provides a security federation mechanism that works across the enterprise and the Internet. ACS allows you to use the identity providers that matter to you while implementing applications that rely on claims based authentication. Learn how to use ACS to federate identities stored in Active Directory, Facebook, Windows Live, Yahoo!, and in Google properties such as GMail and Google Applications.

pluralsight - Identity and Access Control in WCF 4.5  

Posted by Polik88 at March 19, 2013
pluralsight - Identity and Access Control in WCF 4.5

pluralsight - Identity and Access Control in WCF 4.5
English | WMV | 1024x768 | VC-1 18.8 Kbps 15.000 fps | WMA 128 Kbps 44.1 khz | 2 channels | 396 MB
Genre: Video Training

If you need to implement authentication and authorization in a WCF service, this course is for you. Topics covered include how to use Windows, UserName and WS-Trust authentication, as well as how to work with claims-based identity and authorization.

Access Control Lists (ACLs) for Cisco CCNA 200-125/100-105 (2016)  eBooks & eLearning

Posted by naag at Nov. 23, 2016
Access Control Lists (ACLs) for Cisco CCNA 200-125/100-105 (2016)

Access Control Lists (ACLs) for Cisco CCNA 200-125/100-105
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | 420 MB
Genre: eLearning | Language: English

Selecting specific traffic as it flows through a network is valuable to make networks function in a predictable way. This course, will walk you through the operation, implementation, and troubleshooting of standard and extended access control lists.

Insider Threats Meet Access Control  eBooks & eLearning

Posted by AlenMiler at Oct. 30, 2016
Insider Threats Meet Access Control

Insider Threats Meet Access Control by Abdulaziz Almehmadi
English | 28 Oct 2016 | ASIN: B01MFDXYWQ | 143 Pages | PDF | 2.89 MB

Existing access control mechanisms are based on the concepts of identity enrollment and recognition, and assume that recognized identity is synonymous with ethical actions.
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control (Repost)

Daniel V. Hoffman, "Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control"
2008 | pages: 278 | ISBN: 0470238380 | PDF | 7,1 mb