ºÝºÝߣshows by User: AdamEnglander / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: AdamEnglander / Fri, 13 Oct 2023 12:11:15 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: AdamEnglander Making PHP Smarter - Dutch PHP 2023.pptx /slideshow/making-php-smarter-dutch-php-2023pptx/262147221 makingphpsmarter-dutchphp2023-231013121116-4f4c2fcb
Gain a practical understanding of how to integrate AI capabilities into your PHP projects with examples from the leading sources of hosted AI: OpenAI and Hugging Face. Armed with this knowledge, you can unlock new possibilities for intelligent, dynamic, and user-centric PHP applications that leverage the power of Artificial Intelligence. So, join us for this transformative journey as we bridge the gap between PHP and AI, opening the door to a world of smarter and more innovative web applications.]]>

Gain a practical understanding of how to integrate AI capabilities into your PHP projects with examples from the leading sources of hosted AI: OpenAI and Hugging Face. Armed with this knowledge, you can unlock new possibilities for intelligent, dynamic, and user-centric PHP applications that leverage the power of Artificial Intelligence. So, join us for this transformative journey as we bridge the gap between PHP and AI, opening the door to a world of smarter and more innovative web applications.]]>
Fri, 13 Oct 2023 12:11:15 GMT /slideshow/making-php-smarter-dutch-php-2023pptx/262147221 AdamEnglander@slideshare.net(AdamEnglander) Making PHP Smarter - Dutch PHP 2023.pptx AdamEnglander Gain a practical understanding of how to integrate AI capabilities into your PHP projects with examples from the leading sources of hosted AI: OpenAI and Hugging Face. Armed with this knowledge, you can unlock new possibilities for intelligent, dynamic, and user-centric PHP applications that leverage the power of Artificial Intelligence. So, join us for this transformative journey as we bridge the gap between PHP and AI, opening the door to a world of smarter and more innovative web applications. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/makingphpsmarter-dutchphp2023-231013121116-4f4c2fcb-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Gain a practical understanding of how to integrate AI capabilities into your PHP projects with examples from the leading sources of hosted AI: OpenAI and Hugging Face. Armed with this knowledge, you can unlock new possibilities for intelligent, dynamic, and user-centric PHP applications that leverage the power of Artificial Intelligence. So, join us for this transformative journey as we bridge the gap between PHP and AI, opening the door to a world of smarter and more innovative web applications.
Making PHP Smarter - Dutch PHP 2023.pptx from Adam Englander
]]>
63 0 https://cdn.slidesharecdn.com/ss_thumbnails/makingphpsmarter-dutchphp2023-231013121116-4f4c2fcb-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Practical API Security - PyCon 2019 /slideshow/practical-api-security-pycon-2019/143245256 practicalapisecurity-pycon2019-190502163514
Presentation on securing APIs for PyCon]]>

Presentation on securing APIs for PyCon]]>
Thu, 02 May 2019 16:35:14 GMT /slideshow/practical-api-security-pycon-2019/143245256 AdamEnglander@slideshare.net(AdamEnglander) Practical API Security - PyCon 2019 AdamEnglander Presentation on securing APIs for PyCon <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/practicalapisecurity-pycon2019-190502163514-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation on securing APIs for PyCon
Practical API Security - PyCon 2019 from Adam Englander
]]>
330 2 https://cdn.slidesharecdn.com/ss_thumbnails/practicalapisecurity-pycon2019-190502163514-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Threat Modeling for Dummies /slideshow/threat-modeling-for-dummies/142279574 threatmodelingfordummies-190426041336
An introduction to threat modeling.]]>

An introduction to threat modeling.]]>
Fri, 26 Apr 2019 04:13:36 GMT /slideshow/threat-modeling-for-dummies/142279574 AdamEnglander@slideshare.net(AdamEnglander) Threat Modeling for Dummies AdamEnglander An introduction to threat modeling. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/threatmodelingfordummies-190426041336-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> An introduction to threat modeling.
Threat Modeling for Dummies from Adam Englander
]]>
289 6 https://cdn.slidesharecdn.com/ss_thumbnails/threatmodelingfordummies-190426041336-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ZendCon 2018 - Practical API Security /slideshow/zendcon-2018-practical-api-security/119713745 zendcon2018-practicalapisecurity-181017073430
With the dominance of Mobile Apps, Single Page Apps for the Web, and Micro-Services, we are all building more APIs than ever before. Like many other developers, I had struggled with finding the right mix of security and simplicity for securing APIs. Some standards from the IETF have made it possible to accomplish both. Let me show you how to utilize existing libraries to lock down you API without writing a ton of code. In this tutorial, you will learn how to write a secure API with future proof security utilizing JOSE. JOSE is a collection of complimentary standards: JWT, JWE, JWS, JWA, and JWK. JOSE is used by OAuth, OpenID, and others to secure communications between APIs and consumers. Now you can use it to secure your API.]]>

With the dominance of Mobile Apps, Single Page Apps for the Web, and Micro-Services, we are all building more APIs than ever before. Like many other developers, I had struggled with finding the right mix of security and simplicity for securing APIs. Some standards from the IETF have made it possible to accomplish both. Let me show you how to utilize existing libraries to lock down you API without writing a ton of code. In this tutorial, you will learn how to write a secure API with future proof security utilizing JOSE. JOSE is a collection of complimentary standards: JWT, JWE, JWS, JWA, and JWK. JOSE is used by OAuth, OpenID, and others to secure communications between APIs and consumers. Now you can use it to secure your API.]]>
Wed, 17 Oct 2018 07:34:30 GMT /slideshow/zendcon-2018-practical-api-security/119713745 AdamEnglander@slideshare.net(AdamEnglander) ZendCon 2018 - Practical API Security AdamEnglander With the dominance of Mobile Apps, Single Page Apps for the Web, and Micro-Services, we are all building more APIs than ever before. Like many other developers, I had struggled with finding the right mix of security and simplicity for securing APIs. Some standards from the IETF have made it possible to accomplish both. Let me show you how to utilize existing libraries to lock down you API without writing a ton of code. In this tutorial, you will learn how to write a secure API with future proof security utilizing JOSE. JOSE is a collection of complimentary standards: JWT, JWE, JWS, JWA, and JWK. JOSE is used by OAuth, OpenID, and others to secure communications between APIs and consumers. Now you can use it to secure your API. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/zendcon2018-practicalapisecurity-181017073430-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> With the dominance of Mobile Apps, Single Page Apps for the Web, and Micro-Services, we are all building more APIs than ever before. Like many other developers, I had struggled with finding the right mix of security and simplicity for securing APIs. Some standards from the IETF have made it possible to accomplish both. Let me show you how to utilize existing libraries to lock down you API without writing a ton of code. In this tutorial, you will learn how to write a secure API with future proof security utilizing JOSE. JOSE is a collection of complimentary standards: JWT, JWE, JWS, JWA, and JWK. JOSE is used by OAuth, OpenID, and others to secure communications between APIs and consumers. Now you can use it to secure your API.
ZendCon 2018 - Practical API Security from Adam Englander
]]>
311 1 https://cdn.slidesharecdn.com/ss_thumbnails/zendcon2018-practicalapisecurity-181017073430-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ZendCon 2018 - Cryptography in Depth /slideshow/zendcon-2018-cryptography-in-depth/119712534 zendcon2018-cryptographyindepth-181017072555
Cryptography is the invisible layer protecting everything around us. As software engineers, we are required to have some understanding of cryptography. Most of us only have a cursory understanding. Let’s dive deep into algorithms and modes for encryption, digital signatures, hashing, and key derivation. To get the most from this presentation, it is expected that you have a basic understanding of cryptography.]]>

Cryptography is the invisible layer protecting everything around us. As software engineers, we are required to have some understanding of cryptography. Most of us only have a cursory understanding. Let’s dive deep into algorithms and modes for encryption, digital signatures, hashing, and key derivation. To get the most from this presentation, it is expected that you have a basic understanding of cryptography.]]>
Wed, 17 Oct 2018 07:25:55 GMT /slideshow/zendcon-2018-cryptography-in-depth/119712534 AdamEnglander@slideshare.net(AdamEnglander) ZendCon 2018 - Cryptography in Depth AdamEnglander Cryptography is the invisible layer protecting everything around us. As software engineers, we are required to have some understanding of cryptography. Most of us only have a cursory understanding. Let’s dive deep into algorithms and modes for encryption, digital signatures, hashing, and key derivation. To get the most from this presentation, it is expected that you have a basic understanding of cryptography. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/zendcon2018-cryptographyindepth-181017072555-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cryptography is the invisible layer protecting everything around us. As software engineers, we are required to have some understanding of cryptography. Most of us only have a cursory understanding. Let’s dive deep into algorithms and modes for encryption, digital signatures, hashing, and key derivation. To get the most from this presentation, it is expected that you have a basic understanding of cryptography.
ZendCon 2018 - Cryptography in Depth from Adam Englander
]]>
245 2 https://cdn.slidesharecdn.com/ss_thumbnails/zendcon2018-cryptographyindepth-181017072555-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Threat Modeling for Dummies - Cascadia PHP 2018 /slideshow/threat-modeling-for-dummies-cascadia-php-2018/113714864 threatmodelingfordummies-cascadiaphp2018-180910043219
No developer wants to be responsible for a major data breach. Unfortunately, when it comes to application security, most developers have more questions than answers. How do I get started? Who should I be protecting against? How much security is enough? Is there a best practice to follow? In less than an hour, I will give you the tools you need to begin integrating threat modeling into your existing application lifecycle. Start building secure applications today.]]>

No developer wants to be responsible for a major data breach. Unfortunately, when it comes to application security, most developers have more questions than answers. How do I get started? Who should I be protecting against? How much security is enough? Is there a best practice to follow? In less than an hour, I will give you the tools you need to begin integrating threat modeling into your existing application lifecycle. Start building secure applications today.]]>
Mon, 10 Sep 2018 04:32:19 GMT /slideshow/threat-modeling-for-dummies-cascadia-php-2018/113714864 AdamEnglander@slideshare.net(AdamEnglander) Threat Modeling for Dummies - Cascadia PHP 2018 AdamEnglander No developer wants to be responsible for a major data breach. Unfortunately, when it comes to application security, most developers have more questions than answers. How do I get started? Who should I be protecting against? How much security is enough? Is there a best practice to follow? In less than an hour, I will give you the tools you need to begin integrating threat modeling into your existing application lifecycle. Start building secure applications today. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/threatmodelingfordummies-cascadiaphp2018-180910043219-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> No developer wants to be responsible for a major data breach. Unfortunately, when it comes to application security, most developers have more questions than answers. How do I get started? Who should I be protecting against? How much security is enough? Is there a best practice to follow? In less than an hour, I will give you the tools you need to begin integrating threat modeling into your existing application lifecycle. Start building secure applications today.
Threat Modeling for Dummies - Cascadia PHP 2018 from Adam Englander
]]>
1746 2 https://cdn.slidesharecdn.com/ss_thumbnails/threatmodelingfordummies-cascadiaphp2018-180910043219-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Dutch PHP 2018 - Cryptography for Beginners /slideshow/dutch-php-2018-cryptography-for-beginners/101320620 dutchphp2018-cryptographyforbeginners-180608140337
Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation functions. While learning how to use these components, you will also learn the best practices that drive strong cryptography. This talk won’t make you a cryptography expert but it will give you the knowledge necessary to use cryptography properly. No prior knowledge of cryptography is required for this presentation.]]>

Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation functions. While learning how to use these components, you will also learn the best practices that drive strong cryptography. This talk won’t make you a cryptography expert but it will give you the knowledge necessary to use cryptography properly. No prior knowledge of cryptography is required for this presentation.]]>
Fri, 08 Jun 2018 14:03:36 GMT /slideshow/dutch-php-2018-cryptography-for-beginners/101320620 AdamEnglander@slideshare.net(AdamEnglander) Dutch PHP 2018 - Cryptography for Beginners AdamEnglander Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation functions. While learning how to use these components, you will also learn the best practices that drive strong cryptography. This talk won’t make you a cryptography expert but it will give you the knowledge necessary to use cryptography properly. No prior knowledge of cryptography is required for this presentation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dutchphp2018-cryptographyforbeginners-180608140337-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation functions. While learning how to use these components, you will also learn the best practices that drive strong cryptography. This talk won’t make you a cryptography expert but it will give you the knowledge necessary to use cryptography properly. No prior knowledge of cryptography is required for this presentation.
Dutch PHP 2018 - Cryptography for Beginners from Adam Englander
]]>
274 6 https://cdn.slidesharecdn.com/ss_thumbnails/dutchphp2018-cryptographyforbeginners-180608140337-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
php[tek] 2108 - Cryptography Advances in PHP 7.2 /slideshow/phptek-2108-cryptography-advances-in-php-72/99990600 phptek2108-cryptographyadvancesinphp7-180601213135
There were some pretty substantial cryptography advances in PHP 7.2. Most of these changes were made to make advanced cryptography easier to use. That’s a good thing for developers and end users alike. The addition of libsodium is a game changer. It makes synchronous and asynchronous cryptography a no-brainer and adds better hashing than we've ever had. Argon2i for passwords is pretty substantial as well. We’ll go over the changes and have some practical examples of each. Developers need to know about these advances and just how awesome they are.]]>

There were some pretty substantial cryptography advances in PHP 7.2. Most of these changes were made to make advanced cryptography easier to use. That’s a good thing for developers and end users alike. The addition of libsodium is a game changer. It makes synchronous and asynchronous cryptography a no-brainer and adds better hashing than we've ever had. Argon2i for passwords is pretty substantial as well. We’ll go over the changes and have some practical examples of each. Developers need to know about these advances and just how awesome they are.]]>
Fri, 01 Jun 2018 21:31:35 GMT /slideshow/phptek-2108-cryptography-advances-in-php-72/99990600 AdamEnglander@slideshare.net(AdamEnglander) php[tek] 2108 - Cryptography Advances in PHP 7.2 AdamEnglander There were some pretty substantial cryptography advances in PHP 7.2. Most of these changes were made to make advanced cryptography easier to use. That’s a good thing for developers and end users alike. The addition of libsodium is a game changer. It makes synchronous and asynchronous cryptography a no-brainer and adds better hashing than we've ever had. Argon2i for passwords is pretty substantial as well. We’ll go over the changes and have some practical examples of each. Developers need to know about these advances and just how awesome they are. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/phptek2108-cryptographyadvancesinphp7-180601213135-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> There were some pretty substantial cryptography advances in PHP 7.2. Most of these changes were made to make advanced cryptography easier to use. That’s a good thing for developers and end users alike. The addition of libsodium is a game changer. It makes synchronous and asynchronous cryptography a no-brainer and adds better hashing than we&#39;ve ever had. Argon2i for passwords is pretty substantial as well. We’ll go over the changes and have some practical examples of each. Developers need to know about these advances and just how awesome they are.
php[tek] 2108 - Cryptography Advances in PHP 7.2 from Adam Englander
]]>
247 2 https://cdn.slidesharecdn.com/ss_thumbnails/phptek2108-cryptographyadvancesinphp7-180601213135-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
php[tek] 2018 - Biometrics, fantastic failure point of the future /slideshow/phptek-2018-biometrics-fantastic-failure-point-of-the-future/99990411 phptek2018-biometricsfantasticfailurepointofthefuture-180601212954
This presentation attempts to prepare developers for the coming storm of biometric authentication. It is coming; for many, it is already here. Unfortunately, few of us have been prepared to select tools for utilizing biometric authentication properly. In this presentation, Adam Englander will express the special dangers of biometrics with regards to lifespan and storage. Due to the user's inability to change a biomteric, it is much more valuable to bad actors as the lifespan will undoubtedly exceed the lifespan of the cryptography. Any biometric database stolen today will likely be able to be cracked by the average computer in 20 years. This creates a unique problem many of us have not had to tackle before. We need a different mindset when thinking about biometrics. This presentation will try and give that much-needed perspective.]]>

This presentation attempts to prepare developers for the coming storm of biometric authentication. It is coming; for many, it is already here. Unfortunately, few of us have been prepared to select tools for utilizing biometric authentication properly. In this presentation, Adam Englander will express the special dangers of biometrics with regards to lifespan and storage. Due to the user's inability to change a biomteric, it is much more valuable to bad actors as the lifespan will undoubtedly exceed the lifespan of the cryptography. Any biometric database stolen today will likely be able to be cracked by the average computer in 20 years. This creates a unique problem many of us have not had to tackle before. We need a different mindset when thinking about biometrics. This presentation will try and give that much-needed perspective.]]>
Fri, 01 Jun 2018 21:29:54 GMT /slideshow/phptek-2018-biometrics-fantastic-failure-point-of-the-future/99990411 AdamEnglander@slideshare.net(AdamEnglander) php[tek] 2018 - Biometrics, fantastic failure point of the future AdamEnglander This presentation attempts to prepare developers for the coming storm of biometric authentication. It is coming; for many, it is already here. Unfortunately, few of us have been prepared to select tools for utilizing biometric authentication properly. In this presentation, Adam Englander will express the special dangers of biometrics with regards to lifespan and storage. Due to the user's inability to change a biomteric, it is much more valuable to bad actors as the lifespan will undoubtedly exceed the lifespan of the cryptography. Any biometric database stolen today will likely be able to be cracked by the average computer in 20 years. This creates a unique problem many of us have not had to tackle before. We need a different mindset when thinking about biometrics. This presentation will try and give that much-needed perspective. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/phptek2018-biometricsfantasticfailurepointofthefuture-180601212954-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation attempts to prepare developers for the coming storm of biometric authentication. It is coming; for many, it is already here. Unfortunately, few of us have been prepared to select tools for utilizing biometric authentication properly. In this presentation, Adam Englander will express the special dangers of biometrics with regards to lifespan and storage. Due to the user&#39;s inability to change a biomteric, it is much more valuable to bad actors as the lifespan will undoubtedly exceed the lifespan of the cryptography. Any biometric database stolen today will likely be able to be cracked by the average computer in 20 years. This creates a unique problem many of us have not had to tackle before. We need a different mindset when thinking about biometrics. This presentation will try and give that much-needed perspective.
php[tek] 2018 - Biometrics, fantastic failure point of the future from Adam Englander
]]>
146 4 https://cdn.slidesharecdn.com/ss_thumbnails/phptek2018-biometricsfantasticfailurepointofthefuture-180601212954-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Biometrics: Sexy, Secure and... Stupid - RSAC 2018 /slideshow/biometrics-sexy-secure-and-stupid-rsac-2018/97766736 biometricssexysecureand-180520190322
Biometric identification might be more secure than passwords, but it’s still vulnerable to hacking. Why not hold up a photograph of the phone owner to fool the new facial recognition system? In this presentation, Adam Englander will walk through the risks and dangers of leveraging biometrics for user authentication, and why we all should be thinking twice about it.]]>

Biometric identification might be more secure than passwords, but it’s still vulnerable to hacking. Why not hold up a photograph of the phone owner to fool the new facial recognition system? In this presentation, Adam Englander will walk through the risks and dangers of leveraging biometrics for user authentication, and why we all should be thinking twice about it.]]>
Sun, 20 May 2018 19:03:22 GMT /slideshow/biometrics-sexy-secure-and-stupid-rsac-2018/97766736 AdamEnglander@slideshare.net(AdamEnglander) Biometrics: Sexy, Secure and... Stupid - RSAC 2018 AdamEnglander Biometric identification might be more secure than passwords, but it’s still vulnerable to hacking. Why not hold up a photograph of the phone owner to fool the new facial recognition system? In this presentation, Adam Englander will walk through the risks and dangers of leveraging biometrics for user authentication, and why we all should be thinking twice about it. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/biometricssexysecureand-180520190322-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Biometric identification might be more secure than passwords, but it’s still vulnerable to hacking. Why not hold up a photograph of the phone owner to fool the new facial recognition system? In this presentation, Adam Englander will walk through the risks and dangers of leveraging biometrics for user authentication, and why we all should be thinking twice about it.
Biometrics: Sexy, Secure and... Stupid - RSAC 2018 from Adam Englander
]]>
171 2 https://cdn.slidesharecdn.com/ss_thumbnails/biometricssexysecureand-180520190322-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Practical API Security - PyCon 2018 /slideshow/practical-api-security-pycon-2018/96530365 practicalapisecurity-pycon2018-180509153225
With the dominance of Mobile Apps, Single Page Apps for the Web, and Micro-Services, we are all building more APIs than ever before. Like many other developers, I had struggled with finding the right mix of security and simplicity for securing APIs. Some standards from the IETF have made it possible to accomplish both. Let me show you how to utilize existing libraries to lock down you API without writing a ton of code. In this tutorial, you will learn how to write a secure API with future proof security utilizing JOSE. JOSE is a collection of complimentary standards: JWT, JWE, JWS, JWA, and JWK. JOSE is used by OAuth, OpenID, and others to secure communications between APIs and consumers. Now you can use it to secure your API.]]>

With the dominance of Mobile Apps, Single Page Apps for the Web, and Micro-Services, we are all building more APIs than ever before. Like many other developers, I had struggled with finding the right mix of security and simplicity for securing APIs. Some standards from the IETF have made it possible to accomplish both. Let me show you how to utilize existing libraries to lock down you API without writing a ton of code. In this tutorial, you will learn how to write a secure API with future proof security utilizing JOSE. JOSE is a collection of complimentary standards: JWT, JWE, JWS, JWA, and JWK. JOSE is used by OAuth, OpenID, and others to secure communications between APIs and consumers. Now you can use it to secure your API.]]>
Wed, 09 May 2018 15:32:25 GMT /slideshow/practical-api-security-pycon-2018/96530365 AdamEnglander@slideshare.net(AdamEnglander) Practical API Security - PyCon 2018 AdamEnglander With the dominance of Mobile Apps, Single Page Apps for the Web, and Micro-Services, we are all building more APIs than ever before. Like many other developers, I had struggled with finding the right mix of security and simplicity for securing APIs. Some standards from the IETF have made it possible to accomplish both. Let me show you how to utilize existing libraries to lock down you API without writing a ton of code. In this tutorial, you will learn how to write a secure API with future proof security utilizing JOSE. JOSE is a collection of complimentary standards: JWT, JWE, JWS, JWA, and JWK. JOSE is used by OAuth, OpenID, and others to secure communications between APIs and consumers. Now you can use it to secure your API. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/practicalapisecurity-pycon2018-180509153225-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> With the dominance of Mobile Apps, Single Page Apps for the Web, and Micro-Services, we are all building more APIs than ever before. Like many other developers, I had struggled with finding the right mix of security and simplicity for securing APIs. Some standards from the IETF have made it possible to accomplish both. Let me show you how to utilize existing libraries to lock down you API without writing a ton of code. In this tutorial, you will learn how to write a secure API with future proof security utilizing JOSE. JOSE is a collection of complimentary standards: JWT, JWE, JWS, JWA, and JWK. JOSE is used by OAuth, OpenID, and others to secure communications between APIs and consumers. Now you can use it to secure your API.
Practical API Security - PyCon 2018 from Adam Englander
]]>
663 2 https://cdn.slidesharecdn.com/ss_thumbnails/practicalapisecurity-pycon2018-180509153225-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Practical API Security - Midwest PHP 2018 /slideshow/practical-api-security-midwest-php-2018/90252224 practicalapisecurity-midwestphp2018-180310143600
With the dominance of Mobile Apps, Single Page Apps for the Web, and Micro-Services, we are all building more APIs than ever before. Like many other developers, I had struggled with finding the right mix of security and simplicity for securing APIs. Some standards from the IETF have made it possible to accomplish both. Let me show you how to utilize existing libraries to lock down you API without writing a ton of code.]]>

With the dominance of Mobile Apps, Single Page Apps for the Web, and Micro-Services, we are all building more APIs than ever before. Like many other developers, I had struggled with finding the right mix of security and simplicity for securing APIs. Some standards from the IETF have made it possible to accomplish both. Let me show you how to utilize existing libraries to lock down you API without writing a ton of code.]]>
Sat, 10 Mar 2018 14:35:59 GMT /slideshow/practical-api-security-midwest-php-2018/90252224 AdamEnglander@slideshare.net(AdamEnglander) Practical API Security - Midwest PHP 2018 AdamEnglander With the dominance of Mobile Apps, Single Page Apps for the Web, and Micro-Services, we are all building more APIs than ever before. Like many other developers, I had struggled with finding the right mix of security and simplicity for securing APIs. Some standards from the IETF have made it possible to accomplish both. Let me show you how to utilize existing libraries to lock down you API without writing a ton of code. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/practicalapisecurity-midwestphp2018-180310143600-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> With the dominance of Mobile Apps, Single Page Apps for the Web, and Micro-Services, we are all building more APIs than ever before. Like many other developers, I had struggled with finding the right mix of security and simplicity for securing APIs. Some standards from the IETF have made it possible to accomplish both. Let me show you how to utilize existing libraries to lock down you API without writing a ton of code.
Practical API Security - Midwest PHP 2018 from Adam Englander
]]>
271 1 https://cdn.slidesharecdn.com/ss_thumbnails/practicalapisecurity-midwestphp2018-180310143600-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cryptography for Beginners - Midwest PHP 2018 /slideshow/cryptography-for-beginners-midwest-php-2018/90167084 cryptographyforbeginners-midwestphp2018-180309160042
Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation functions. While learning how to use these components, you will also learn the best practices that drive strong cryptography. This talk won’t make you a cryptography expert but it will give you the knowledge necessary to use cryptography properly. No prior knowledge of cryptography is required for this presentation.]]>

Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation functions. While learning how to use these components, you will also learn the best practices that drive strong cryptography. This talk won’t make you a cryptography expert but it will give you the knowledge necessary to use cryptography properly. No prior knowledge of cryptography is required for this presentation.]]>
Fri, 09 Mar 2018 16:00:42 GMT /slideshow/cryptography-for-beginners-midwest-php-2018/90167084 AdamEnglander@slideshare.net(AdamEnglander) Cryptography for Beginners - Midwest PHP 2018 AdamEnglander Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation functions. While learning how to use these components, you will also learn the best practices that drive strong cryptography. This talk won’t make you a cryptography expert but it will give you the knowledge necessary to use cryptography properly. No prior knowledge of cryptography is required for this presentation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cryptographyforbeginners-midwestphp2018-180309160042-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation functions. While learning how to use these components, you will also learn the best practices that drive strong cryptography. This talk won’t make you a cryptography expert but it will give you the knowledge necessary to use cryptography properly. No prior knowledge of cryptography is required for this presentation.
Cryptography for Beginners - Midwest PHP 2018 from Adam Englander
]]>
233 1 https://cdn.slidesharecdn.com/ss_thumbnails/cryptographyforbeginners-midwestphp2018-180309160042-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cryptography for Beginners - Sunshine PHP 2018 /slideshow/cryptography-for-beginners-sunshine-php-2018/87701644 cryptographyforbeginners-sunshinephp2018-180210042448
Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation functions. While learning how to use these components, you will also learn the best practices that drive strong cryptography . This talk won’t make you a cryptography expert but it will give you the knowledge necessary to use cryptography properly. No prior knowledge of cryptography is required for this presentation.]]>

Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation functions. While learning how to use these components, you will also learn the best practices that drive strong cryptography . This talk won’t make you a cryptography expert but it will give you the knowledge necessary to use cryptography properly. No prior knowledge of cryptography is required for this presentation.]]>
Sat, 10 Feb 2018 04:24:48 GMT /slideshow/cryptography-for-beginners-sunshine-php-2018/87701644 AdamEnglander@slideshare.net(AdamEnglander) Cryptography for Beginners - Sunshine PHP 2018 AdamEnglander Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation functions. While learning how to use these components, you will also learn the best practices that drive strong cryptography . This talk won’t make you a cryptography expert but it will give you the knowledge necessary to use cryptography properly. No prior knowledge of cryptography is required for this presentation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cryptographyforbeginners-sunshinephp2018-180210042448-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation functions. While learning how to use these components, you will also learn the best practices that drive strong cryptography . This talk won’t make you a cryptography expert but it will give you the knowledge necessary to use cryptography properly. No prior knowledge of cryptography is required for this presentation.
Cryptography for Beginners - Sunshine PHP 2018 from Adam Englander
]]>
406 2 https://cdn.slidesharecdn.com/ss_thumbnails/cryptographyforbeginners-sunshinephp2018-180210042448-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ConFoo Vancouver 2017 - Biometrics: Fantastic Failure Point of the Future /slideshow/confoo-vancouver-2017-biometrics-fantastic-failure-point-of-the-future/83529910 confoovancouver2017-biometricsfantasticfailurepointofthefuture-171207041721
Biometrics is all the rage. It has been touted as the best of all possible authentication methods. Very soon, your customers and standards boards will require you to implement some sort of biometric factor for authentication. Before you head down that road, you need to know the pitfalls to avoid before becoming the next big breach in the news. Learn a few tricks to help safely secure biometrics to protect your users. ]]>

Biometrics is all the rage. It has been touted as the best of all possible authentication methods. Very soon, your customers and standards boards will require you to implement some sort of biometric factor for authentication. Before you head down that road, you need to know the pitfalls to avoid before becoming the next big breach in the news. Learn a few tricks to help safely secure biometrics to protect your users. ]]>
Thu, 07 Dec 2017 04:17:21 GMT /slideshow/confoo-vancouver-2017-biometrics-fantastic-failure-point-of-the-future/83529910 AdamEnglander@slideshare.net(AdamEnglander) ConFoo Vancouver 2017 - Biometrics: Fantastic Failure Point of the Future AdamEnglander Biometrics is all the rage. It has been touted as the best of all possible authentication methods. Very soon, your customers and standards boards will require you to implement some sort of biometric factor for authentication. Before you head down that road, you need to know the pitfalls to avoid before becoming the next big breach in the news. Learn a few tricks to help safely secure biometrics to protect your users. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/confoovancouver2017-biometricsfantasticfailurepointofthefuture-171207041721-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Biometrics is all the rage. It has been touted as the best of all possible authentication methods. Very soon, your customers and standards boards will require you to implement some sort of biometric factor for authentication. Before you head down that road, you need to know the pitfalls to avoid before becoming the next big breach in the news. Learn a few tricks to help safely secure biometrics to protect your users.
ConFoo Vancouver 2017 - Biometrics: Fantastic Failure Point of the Future from Adam Englander
]]>
171 3 https://cdn.slidesharecdn.com/ss_thumbnails/confoovancouver2017-biometricsfantasticfailurepointofthefuture-171207041721-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Con Foo 2017 - Don't Loose Sleep - Secure Your REST /slideshow/con-foo-2017-dont-loose-sleep-secure-your-rest/83349403 confoo2017-dontloosesleep-secureyourrest-171204210330
Are you worried that your REST API may be the next victim of an attack by ruthless hackers? Don't fret. Utilizing the same standards implemented by OAuth 2.0 and OpenID Connect, you can secure your REST API. JSON Object Signing and Encryption (JOSE) is the core of a truly secure standards-based REST API. Let me show you how to ensure the data sent too and received from your API is as safe and secure as is reasonably possible. ]]>

Are you worried that your REST API may be the next victim of an attack by ruthless hackers? Don't fret. Utilizing the same standards implemented by OAuth 2.0 and OpenID Connect, you can secure your REST API. JSON Object Signing and Encryption (JOSE) is the core of a truly secure standards-based REST API. Let me show you how to ensure the data sent too and received from your API is as safe and secure as is reasonably possible. ]]>
Mon, 04 Dec 2017 21:03:30 GMT /slideshow/con-foo-2017-dont-loose-sleep-secure-your-rest/83349403 AdamEnglander@slideshare.net(AdamEnglander) Con Foo 2017 - Don't Loose Sleep - Secure Your REST AdamEnglander Are you worried that your REST API may be the next victim of an attack by ruthless hackers? Don't fret. Utilizing the same standards implemented by OAuth 2.0 and OpenID Connect, you can secure your REST API. JSON Object Signing and Encryption (JOSE) is the core of a truly secure standards-based REST API. Let me show you how to ensure the data sent too and received from your API is as safe and secure as is reasonably possible. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/confoo2017-dontloosesleep-secureyourrest-171204210330-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Are you worried that your REST API may be the next victim of an attack by ruthless hackers? Don&#39;t fret. Utilizing the same standards implemented by OAuth 2.0 and OpenID Connect, you can secure your REST API. JSON Object Signing and Encryption (JOSE) is the core of a truly secure standards-based REST API. Let me show you how to ensure the data sent too and received from your API is as safe and secure as is reasonably possible.
Con Foo 2017 - Don't Loose Sleep - Secure Your REST from Adam Englander
]]>
242 1 https://cdn.slidesharecdn.com/ss_thumbnails/confoo2017-dontloosesleep-secureyourrest-171204210330-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ZendCon 2017 - Cryptography for Beginners /slideshow/zendcon-2017-cryptography-for-beginners/81212131 introtocryptography-171025212901
Cryptography is a complex and confusing subject. In this session we'll distill PHP encryption down to its essential drivers. You'll learn what makes cryptography weak and strong. You'll learn the important questions to ask when making decisions regarding modules and libraries. This session won’t make you a cryptography expert but it will give you the knowledge necessary to protect your software from attack. No prior knowledge of cryptography is required for this session.]]>

Cryptography is a complex and confusing subject. In this session we'll distill PHP encryption down to its essential drivers. You'll learn what makes cryptography weak and strong. You'll learn the important questions to ask when making decisions regarding modules and libraries. This session won’t make you a cryptography expert but it will give you the knowledge necessary to protect your software from attack. No prior knowledge of cryptography is required for this session.]]>
Wed, 25 Oct 2017 21:29:01 GMT /slideshow/zendcon-2017-cryptography-for-beginners/81212131 AdamEnglander@slideshare.net(AdamEnglander) ZendCon 2017 - Cryptography for Beginners AdamEnglander Cryptography is a complex and confusing subject. In this session we'll distill PHP encryption down to its essential drivers. You'll learn what makes cryptography weak and strong. You'll learn the important questions to ask when making decisions regarding modules and libraries. This session won’t make you a cryptography expert but it will give you the knowledge necessary to protect your software from attack. No prior knowledge of cryptography is required for this session. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/introtocryptography-171025212901-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cryptography is a complex and confusing subject. In this session we&#39;ll distill PHP encryption down to its essential drivers. You&#39;ll learn what makes cryptography weak and strong. You&#39;ll learn the important questions to ask when making decisions regarding modules and libraries. This session won’t make you a cryptography expert but it will give you the knowledge necessary to protect your software from attack. No prior knowledge of cryptography is required for this session.
ZendCon 2017 - Cryptography for Beginners from Adam Englander
]]>
693 11 https://cdn.slidesharecdn.com/ss_thumbnails/introtocryptography-171025212901-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ZendCon 2017: The Red Team is Coming /slideshow/zendcon-2017-the-red-team-is-coming/81160071 zendcon2017-theredteamiscoming-171024180402
The Red Team, hackers, criminal organizations, and nation states, are a constant threat. The systems we build are the targets. We need to understand the human collateral that hangs in the balance. We embrace methodologies to write better code and make our lives better. They do nothing for the rest of humanity that is directly affected by security vulnerabilities we introduce. In this session we'll put a human face on the users of our software. It will challenge you to think in terms of flesh and blood rather than ones and zeros. We are all the Blue Team. We protect the rest of humanity. Join us in the fight. The Red Team is coming!]]>

The Red Team, hackers, criminal organizations, and nation states, are a constant threat. The systems we build are the targets. We need to understand the human collateral that hangs in the balance. We embrace methodologies to write better code and make our lives better. They do nothing for the rest of humanity that is directly affected by security vulnerabilities we introduce. In this session we'll put a human face on the users of our software. It will challenge you to think in terms of flesh and blood rather than ones and zeros. We are all the Blue Team. We protect the rest of humanity. Join us in the fight. The Red Team is coming!]]>
Tue, 24 Oct 2017 18:04:02 GMT /slideshow/zendcon-2017-the-red-team-is-coming/81160071 AdamEnglander@slideshare.net(AdamEnglander) ZendCon 2017: The Red Team is Coming AdamEnglander The Red Team, hackers, criminal organizations, and nation states, are a constant threat. The systems we build are the targets. We need to understand the human collateral that hangs in the balance. We embrace methodologies to write better code and make our lives better. They do nothing for the rest of humanity that is directly affected by security vulnerabilities we introduce. In this session we'll put a human face on the users of our software. It will challenge you to think in terms of flesh and blood rather than ones and zeros. We are all the Blue Team. We protect the rest of humanity. Join us in the fight. The Red Team is coming! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/zendcon2017-theredteamiscoming-171024180402-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The Red Team, hackers, criminal organizations, and nation states, are a constant threat. The systems we build are the targets. We need to understand the human collateral that hangs in the balance. We embrace methodologies to write better code and make our lives better. They do nothing for the rest of humanity that is directly affected by security vulnerabilities we introduce. In this session we&#39;ll put a human face on the users of our software. It will challenge you to think in terms of flesh and blood rather than ones and zeros. We are all the Blue Team. We protect the rest of humanity. Join us in the fight. The Red Team is coming!
ZendCon 2017: The Red Team is Coming from Adam Englander
]]>
327 1 https://cdn.slidesharecdn.com/ss_thumbnails/zendcon2017-theredteamiscoming-171024180402-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ZendCon 2017 - Build a Bot Workshop - Async Primer /slideshow/zendcon-2017-build-a-bot-workshop-async-primer/81080722 zendcon2017-buildabotworkshop-asyncprimer-171023020617
Asynchronous software development is rapidly moving from the niche to the mainstream. That mainstream now includes PHP. This workshop will give you hands on instruction in building an asynchronous application in PHP. We'll build a Twitter Bot utilizing the Amp concurrency framework for PHP and the Twitter Streaming API. During this time you'll learn the basics regarding the Amp event loop, generators and co-routines, and writing non-blocking code. Get ready for the future of PHP today.]]>

Asynchronous software development is rapidly moving from the niche to the mainstream. That mainstream now includes PHP. This workshop will give you hands on instruction in building an asynchronous application in PHP. We'll build a Twitter Bot utilizing the Amp concurrency framework for PHP and the Twitter Streaming API. During this time you'll learn the basics regarding the Amp event loop, generators and co-routines, and writing non-blocking code. Get ready for the future of PHP today.]]>
Mon, 23 Oct 2017 02:06:17 GMT /slideshow/zendcon-2017-build-a-bot-workshop-async-primer/81080722 AdamEnglander@slideshare.net(AdamEnglander) ZendCon 2017 - Build a Bot Workshop - Async Primer AdamEnglander Asynchronous software development is rapidly moving from the niche to the mainstream. That mainstream now includes PHP. This workshop will give you hands on instruction in building an asynchronous application in PHP. We'll build a Twitter Bot utilizing the Amp concurrency framework for PHP and the Twitter Streaming API. During this time you'll learn the basics regarding the Amp event loop, generators and co-routines, and writing non-blocking code. Get ready for the future of PHP today. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/zendcon2017-buildabotworkshop-asyncprimer-171023020617-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Asynchronous software development is rapidly moving from the niche to the mainstream. That mainstream now includes PHP. This workshop will give you hands on instruction in building an asynchronous application in PHP. We&#39;ll build a Twitter Bot utilizing the Amp concurrency framework for PHP and the Twitter Streaming API. During this time you&#39;ll learn the basics regarding the Amp event loop, generators and co-routines, and writing non-blocking code. Get ready for the future of PHP today.
ZendCon 2017 - Build a Bot Workshop - Async Primer from Adam Englander
]]>
337 2 https://cdn.slidesharecdn.com/ss_thumbnails/zendcon2017-buildabotworkshop-asyncprimer-171023020617-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Symfony Live San Franciso 2017 - BDD API Development with Symfony and Behat /slideshow/symfony-live-san-franciso-2017-bdd-api-development-with-symfony-and-behat/80974004 symfonylivesanfranciso2017-bddapidevelopmentwithsymfonyandbehat-171019074746
BDD API Development with Symfony and Behat You may have built an API in Symfony before. You may have even written some browser tests in Beta. Did you ever consider using Behat to write integration tests for your API? If not, you definitely should. The portability and reusability of Behat steps make it the perfect platform for API integration tests. The Symfony kernel integration for Behat and absence of JavaScript in an API makes this match made in heaven. Pull up a cloud and let me show you the pure awesomeness that is BDD API Development with Symfony and Behat.]]>

BDD API Development with Symfony and Behat You may have built an API in Symfony before. You may have even written some browser tests in Beta. Did you ever consider using Behat to write integration tests for your API? If not, you definitely should. The portability and reusability of Behat steps make it the perfect platform for API integration tests. The Symfony kernel integration for Behat and absence of JavaScript in an API makes this match made in heaven. Pull up a cloud and let me show you the pure awesomeness that is BDD API Development with Symfony and Behat.]]>
Thu, 19 Oct 2017 07:47:45 GMT /slideshow/symfony-live-san-franciso-2017-bdd-api-development-with-symfony-and-behat/80974004 AdamEnglander@slideshare.net(AdamEnglander) Symfony Live San Franciso 2017 - BDD API Development with Symfony and Behat AdamEnglander BDD API Development with Symfony and Behat You may have built an API in Symfony before. You may have even written some browser tests in Beta. Did you ever consider using Behat to write integration tests for your API? If not, you definitely should. The portability and reusability of Behat steps make it the perfect platform for API integration tests. The Symfony kernel integration for Behat and absence of JavaScript in an API makes this match made in heaven. Pull up a cloud and let me show you the pure awesomeness that is BDD API Development with Symfony and Behat. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/symfonylivesanfranciso2017-bddapidevelopmentwithsymfonyandbehat-171019074746-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> BDD API Development with Symfony and Behat You may have built an API in Symfony before. You may have even written some browser tests in Beta. Did you ever consider using Behat to write integration tests for your API? If not, you definitely should. The portability and reusability of Behat steps make it the perfect platform for API integration tests. The Symfony kernel integration for Behat and absence of JavaScript in an API makes this match made in heaven. Pull up a cloud and let me show you the pure awesomeness that is BDD API Development with Symfony and Behat.
Symfony Live San Franciso 2017 - BDD API Development with Symfony and Behat from Adam Englander
]]>
253 3 https://cdn.slidesharecdn.com/ss_thumbnails/symfonylivesanfranciso2017-bddapidevelopmentwithsymfonyandbehat-171019074746-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-AdamEnglander-48x48.jpg?cb=1702867743 Results oriented technologist with experience in all levels of technology research, design, development, and implementation. A unique technology perspective that comes from having worked in small, medium, and very large companies. zetta.fi https://cdn.slidesharecdn.com/ss_thumbnails/makingphpsmarter-dutchphp2023-231013121116-4f4c2fcb-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/making-php-smarter-dutch-php-2023pptx/262147221 Making PHP Smarter - D... https://cdn.slidesharecdn.com/ss_thumbnails/practicalapisecurity-pycon2019-190502163514-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/practical-api-security-pycon-2019/143245256 Practical API Security... https://cdn.slidesharecdn.com/ss_thumbnails/threatmodelingfordummies-190426041336-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/threat-modeling-for-dummies/142279574 Threat Modeling for Du...