Search Results for ''

published presentations and documents on DocSlides.

Build Your Own REST Service
Build Your Own REST Service
by mitsue-stanley
with . Web API 2. Scot Hillier. MVP. Scot Hillier...
Switching you on to YakaOur prepaid electricity service
Switching you on to YakaOur prepaid electricity service
by bethany
2 3 Yaka!Your QuestionsAnswered 2 3 Yaka!Your Ques...
Windows Azure AppFabric
Windows Azure AppFabric
by hondasnoopy
Rochdi. . Chakroun. Geoffrey Daniel. Thomas Cont...
REST Services Security  using the Access Control Service
REST Services Security using the Access Control Service
by sistertive
Justin Smith. Senior Program Manager. Microsoft Co...
It s people!
It s people!
by bikershobbit
TNC19. Tallinn. . 18. /6/2019. G. iuseppe Attardi...
Distributed Web Security for
Distributed Web Security for
by sherrill-nordquist
Science Gateways. Jim Basney. jbasney@illinois.ed...
Queue Management
Queue Management
by myesha-ticknor
Queue management Process. Customer Experience. Au...
ANSI X9.119
ANSI X9.119
by test
Part 2: Using Tokenization Methods. Terence Spies...
Using Claims based authentication with SharePoint
Using Claims based authentication with SharePoint
by ellena-manuel
Nauzad Kapadia. Identity and Identity Providers. ...
Explicating SDKs:
Explicating SDKs:
by tatiana-dople
Uncovering Assumptions Underlying Secure Authenti...
Xbox LIVE on Windows 8
Xbox LIVE on Windows 8
by jane-oiler
Deep dive. Brian Tyler. Principal Development Lea...
Securing, Connecting, and Scaling
Securing, Connecting, and Scaling
by cheryl-pisano
in Windows Azure. Name. Title. Microsoft . Corpor...
Smart Card to the Cloud for Convenient,
Smart Card to the Cloud for Convenient,
by ellena-manuel
Secured. . NFC Payment. KONA I. Who We Are?. Saz...
AAI …  but This talk is about the second 'A':
AAI … but This talk is about the second 'A':
by jane-oiler
Authorisation. .. Quick recap: which is which?. C...
Single sign on and authorization
Single sign on and authorization
by liane-varnes
Single sign on and authorization Unifying securit...
STAY IN CONTROL
STAY IN CONTROL
by jasmine
WITH YAKA! Prepaid Electricity 1 What is Yaka? Yak...
Developing SharePoint Framework Web Parts with Power BI Embedding
Developing SharePoint Framework Web Parts with Power BI Embedding
by christina
Instructor, Developer and Power BI MVP. Ted Pattis...
Building  the  Modern Research
Building the Modern Research
by everly
Data . Portal. Oak Ridge National Lab. Rachana (. ...
Microsoft Azure:  Developing Solutions
Microsoft Azure: Developing Solutions
by kittie-lecroy
Active . Directory, DirectX. , Internet . Explore...
Securing Rich Client Applications Using OAuth 2.0 and Windo
Securing Rich Client Applications Using OAuth 2.0 and Windo
by lindy-dunigan
Caleb Baker. Senior Program Manager. WAD-B307. Ag...
IDA314
IDA314
by luanne-stotts
–. Live ID, Open ID & OAuth. What is the d...
Windows 10 + Azure AD + Intune = desktop management and pro
Windows 10 + Azure AD + Intune = desktop management and pro
by tatyana-admore
Daniel Bowbyes & Malcolm Jeffrey. M368. Malco...
MRP Section
MRP Section
by tawny-fly
Embassy of Pakistan, Seoul. Embassy of Pakistan, ...
Distributed Web Security for
Distributed Web Security for
by calandra-battersby
Science Gateways. Jim Basney. jbasney@illinois.ed...
Identity:
Identity:
by tatiana-dople
“Geneva” Deep Dive.  Jan Alexander. Progr...
Identity:
Identity:
by jane-oiler
Windows CardSpace "Geneva" Under the Hood.  Ri...
Hadoop and Kerberos:
Hadoop and Kerberos:
by stefany-barnette
The madness beyond the gate. Steve Loughran. stev...
INF 123
INF 123
by yoshiko-marsland
SW Arch, dist sys & . interop. Lecture . 16. ...
Simulation
Simulation
by min-jolicoeur
. Techniques. Computer Simulation and . Modellin...
Securing
Securing
by cheryl-pisano
cloud applications . with Windows Azure Active Di...