OAuth

Results: 220



#Item
181Google Authentication using OAuth 2.0 February[removed]Cloud Technology Solutions

Google Authentication using OAuth 2.0 February[removed]Cloud Technology Solutions

Add to Reading List

Source URL: www.cloudsolutions.co.uk

Language: English - Date: 2014-03-24 16:17:52
182Package ‘RGoogleAnalytics’ August 16, 2014 Version[removed]Date[removed]Title R Wrapper for the Google Analytics API Author Michael Pearmain. Contributions from Nick Mihailowski,Vignesh Prajapati, Kushan Shah and Ni

Package ‘RGoogleAnalytics’ August 16, 2014 Version[removed]Date[removed]Title R Wrapper for the Google Analytics API Author Michael Pearmain. Contributions from Nick Mihailowski,Vignesh Prajapati, Kushan Shah and Ni

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-08-16 11:31:14
183Security Whitepaper  November 2013 Cloud Technology Solutions Lowry House

Security Whitepaper November 2013 Cloud Technology Solutions Lowry House

Add to Reading List

Source URL: www.cloudsolutions.co.uk

Language: English - Date: 2014-02-07 07:35:34
184Abusing Twitter API & OAuth Implementation Nicolas Seriot April 10th, 2013 Hack In The Box Amsterdam, NL

Abusing Twitter API & OAuth Implementation Nicolas Seriot April 10th, 2013 Hack In The Box Amsterdam, NL

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 13:04:35
185OAuth 2.0 and the Road to XSS: attacking Facebook Platform Andrey Labunets — @isciurus Who is @isciurus •

OAuth 2.0 and the Road to XSS: attacking Facebook Platform Andrey Labunets — @isciurus Who is @isciurus •

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 13:04:34
186Greg was tasked to take notes in the Tech sessions, but here is what I collected:

Greg was tasked to take notes in the Tech sessions, but here is what I collected:

Add to Reading List

Source URL: cegis.usgs.gov

Language: English - Date: 2010-01-28 17:09:52
187HathiTrust Digital Library Update On March Activities April 13, 2012 November

HathiTrust Digital Library Update On March Activities April 13, 2012 November

Add to Reading List

Source URL: www.hathitrust.org

Language: English - Date: 2012-04-13 15:19:14
188PKAuth: A Social Login Protocol for Unregistered Apps Francisco Corella and Karen Lewison Pomcor PKAuth Protocol Flow

PKAuth: A Social Login Protocol for Unregistered Apps Francisco Corella and Karen Lewison Pomcor PKAuth Protocol Flow

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2011-03-14 12:30:54
189Notes from VGI Tech II  Lead by Brady Forrest Ideas: True Volunteered Geographic Information (VGI) from loopt, flickr, linkedin, twitter,

Notes from VGI Tech II Lead by Brady Forrest Ideas: True Volunteered Geographic Information (VGI) from loopt, flickr, linkedin, twitter,

Add to Reading List

Source URL: cegis.usgs.gov

Language: English - Date: 2010-01-28 17:10:05
190Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2014-03-02 06:27:58