Authentication is fundamental to software development. Unfortunately, the authentication process is often an afterthought and implemented in a way that creates unnecessary risk. We'll talk about different approaches and gotchas for implementing authentication. For the user, these include password strength rules and two-factor authentication. Less visible, but equally important, are techniques for mitigating network risks. These including proper cookie handling, encryption, and server configuration. You will gain a better understanding of security risks and how to mitigate them.
6:00-6:30 - Mingle, Eat/Drink, and Welcome/Housekeeping
6:45 - Presentation
A block or so north on that same side of the road is a lot that allows cheaper parking after 6pm (I think either $2 or $4 for the evening). Before 6pm it is employee parking.
There is also street parking in the Highland neighborhood across the bridge or at the nearby park. There are plenty of 2 hour street parking, but there should also be spots for longer than that if you can find them.
Men are welcome as the guests of women coders.