Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
Build Your Own REST Service
by mitsue-stanley
with . Web API 2. Scot Hillier. MVP. Scot Hillier...
Switching you on to YakaOur prepaid electricity service
by bethany
2 3 Yaka!Your QuestionsAnswered 2 3 Yaka!Your Ques...
Windows Azure AppFabric
by hondasnoopy
Rochdi. . Chakroun. Geoffrey Daniel. Thomas Cont...
REST Services Security using the Access Control Service
by sistertive
Justin Smith. Senior Program Manager. Microsoft Co...
It s people!
by bikershobbit
TNC19. Tallinn. . 18. /6/2019. G. iuseppe Attardi...
Distributed Web Security for
by sherrill-nordquist
Science Gateways. Jim Basney. jbasney@illinois.ed...
Queue Management
by myesha-ticknor
Queue management Process. Customer Experience. Au...
ANSI X9.119
by test
Part 2: Using Tokenization Methods. Terence Spies...
Using Claims based authentication with SharePoint
by ellena-manuel
Nauzad Kapadia. Identity and Identity Providers. ...
Explicating SDKs:
by tatiana-dople
Uncovering Assumptions Underlying Secure Authenti...
Xbox LIVE on Windows 8
by jane-oiler
Deep dive. Brian Tyler. Principal Development Lea...
Securing, Connecting, and Scaling
by cheryl-pisano
in Windows Azure. Name. Title. Microsoft . Corpor...
Smart Card to the Cloud for Convenient,
by ellena-manuel
Secured. . NFC Payment. KONA I. Who We Are?. Saz...
AAI … but This talk is about the second 'A':
by jane-oiler
Authorisation. .. Quick recap: which is which?. C...
Single sign on and authorization
by liane-varnes
Single sign on and authorization Unifying securit...
STAY IN CONTROL
by jasmine
WITH YAKA! Prepaid Electricity 1 What is Yaka? Yak...
Developing SharePoint Framework Web Parts with Power BI Embedding
by christina
Instructor, Developer and Power BI MVP. Ted Pattis...
Building the Modern Research
by everly
Data . Portal. Oak Ridge National Lab. Rachana (. ...
Microsoft Azure: Developing Solutions
by kittie-lecroy
Active . Directory, DirectX. , Internet . Explore...
Securing Rich Client Applications Using OAuth 2.0 and Windo
by lindy-dunigan
Caleb Baker. Senior Program Manager. WAD-B307. Ag...
IDA314
by luanne-stotts
–. Live ID, Open ID & OAuth. What is the d...
Windows 10 + Azure AD + Intune = desktop management and pro
by tatyana-admore
Daniel Bowbyes & Malcolm Jeffrey. M368. Malco...
MRP Section
by tawny-fly
Embassy of Pakistan, Seoul. Embassy of Pakistan, ...
Distributed Web Security for
by calandra-battersby
Science Gateways. Jim Basney. jbasney@illinois.ed...
Identity:
by tatiana-dople
“Geneva” Deep Dive. Jan Alexander. Progr...
Identity:
by jane-oiler
Windows CardSpace "Geneva" Under the Hood. Ri...
Hadoop and Kerberos:
by stefany-barnette
The madness beyond the gate. Steve Loughran. stev...
INF 123
by yoshiko-marsland
SW Arch, dist sys & . interop. Lecture . 16. ...
Simulation
by min-jolicoeur
. Techniques. Computer Simulation and . Modellin...
Securing
by cheryl-pisano
cloud applications . with Windows Azure Active Di...
Load More...