|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_on1048817635 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
180818s2018 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d YDX
|d MERUC
|d CHVBK
|d OCLCO
|d OCLCF
|d OCLCQ
|d LVT
|d UKAHL
|d OCLCQ
|d UX1
|d K6U
|d NLW
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1048119203
|a 1055261671
|a 1175620989
|
020 |
|
|
|a 9781788990073
|
020 |
|
|
|a 1788990072
|
020 |
|
|
|a 9781788995979
|
020 |
|
|
|a 178899597X
|q (Trade Paper)
|
024 |
3 |
|
|a 9781788995979
|
029 |
1 |
|
|a AU@
|b 000066231006
|
029 |
1 |
|
|a CHNEW
|b 001024199
|
029 |
1 |
|
|a CHVBK
|b 530305097
|
035 |
|
|
|a (OCoLC)1048817635
|z (OCoLC)1048119203
|z (OCoLC)1055261671
|z (OCoLC)1175620989
|
037 |
|
|
|a B10167
|b 01201872
|
050 |
|
4 |
|a QA76.88
|b .J646 2018
|
082 |
0 |
4 |
|a 004.35
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a John, Tomcy.
|
245 |
1 |
0 |
|a Hands-On Spring Security 5 for Reactive Applications :
|b Learn Effective Ways to Secure Your Applications with Spring and Spring WebFlux.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing Ltd,
|c 2018.
|
300 |
|
|
|a 1 online resource (262 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Title Page; Copyright and Credits; Dedication; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Overview of Spring 5 and Spring Security 5; How examples are structured; New-generation application requirements; Reactive programming; Reactive applications; Reactive Manifesto; Responsive; Resilient; Elastic; Message-driven; Spring Framework; Reactive Landscape in Java; Reactive Streams and Reactive Streams Specifications; Non-blocking; Backpressure; Reactive Extensions; RxJava; Reactive Streams and RxJava; JDK 9 additions; Important interfaces; The Publisher Interface.
|
505 |
8 |
|
|a The Subscriber InterfaceThe Subscription interface; The Processor interface; Spring Framework and reactive applications; Modules in Reactor; Reactive types in Reactor Core; The Flux reative type; The Mono reactive type; Data stream types; Reactor and RxJava; Reactive Web Application; Spring WebFlux; Reactive Spring Web; WebClient; WebSockets; Application security; Spring Security; Spring Security terminologies; Spring Security's core features; Authentication; Authorization; Spring Security 5's new features; Working of Spring Security; Servlet Filter; Filter Chain.
|
505 |
8 |
|
|a Security Interceptor (DelegatingFilterProxy)Core Spring Security modules; Summary; Chapter 2: Deep Diving into Spring Security; Authentication; Setting up AuthenticationManager; AuthenticationProvider; Custom AuthenticationProvider; Multiple AuthenticationProvider; Sample application; Base project setup; Step 1-Create a Maven project in IntelliJ IDEA; Step 2-pom.xml changes; Step 3-MySQL database schema setup; Step 4-Setting up MySQL database properties in your project; Step 5-Spring application configuration; Step 6-Web application configuration; Step 7-Spring MVC setup.
|
505 |
8 |
|
|a Step 8-Controller setupStep 9-JSP creation; Spring Security setup; Step 1-Spring Security configuration setup; Step 2-Spring Security setup for a web application; Running the application; In-memory user storage; Run as Spring Boot; Authorization; Web URL; Method invocation; Domain instance; Other Spring Security capabilities; Summary; Chapter 3: Authentication Using SAML, LDAP, and OAuth/OIDC; Security Assertion Markup Language; Setting up an SSO provider; Setting up the project; The pom.xml file setup; The application.yml file setup; The Spring Security configuration files.
|
505 |
8 |
|
|a The resources folder setupRunning and testing the application; Lightweight Directory Access Protocol; Set up dependencies in the pom.xml file; Spring Security configuration; LDAP server setup; Setting up users in the LDAP server; Running the application; Seeing the application in action on a browser; OAuth2 and OpenID Connect; Setting up a project; Bootstrap Spring project using Spring Initializr; Inclusion of OAuth libraries in pom.xml; Setting up provider details in application.properties; Provider setup; Default application change; The HomeController class; The home.jsp file.
|
500 |
|
|
|a Spring Boot main application class change.
|
520 |
|
|
|a Security is one of the most vital concerns for any organization. The complexity of an application is compounded when you need to integrate security with existing code, new technology, and other frameworks. This book will show you how to effectively write Java code that is robust and easy to maintain.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a High performance computing.
|
650 |
|
0 |
|a Application software
|x Development.
|
650 |
|
6 |
|a Superinformatique.
|
650 |
|
6 |
|a Logiciels d'application
|x Développement.
|
650 |
|
7 |
|a Enterprise software.
|2 bicssc
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Programming & scripting languages: general.
|2 bicssc
|
650 |
|
7 |
|a Computers
|x Enterprise Applications
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Programming Languages
|x Java.
|2 bisacsh
|
650 |
|
7 |
|a Application software
|x Development
|2 fast
|
650 |
|
7 |
|a High performance computing
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a John, Tomcy.
|t Hands-On Spring Security 5 for Reactive Applications : Learn Effective Ways to Secure Your Applications with Spring and Spring WebFlux.
|d Birmingham : Packt Publishing Ltd, ©2018
|z 9781788995979
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5485026
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n BDZ0037629802
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5485026
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15625724
|
994 |
|
|
|a 92
|b IZTAP
|