Cargando…

Hands-On Spring Security 5 for Reactive Applications : Learn Effective Ways to Secure Your Applications with Spring and Spring WebFlux.

Security is one of the most vital concerns for any organization. The complexity of an application is compounded when you need to integrate security with existing code, new technology, and other frameworks. This book will show you how to effectively write Java code that is robust and easy to maintain...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: John, Tomcy
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing Ltd, 2018.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1048817635
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 180818s2018 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d YDX  |d MERUC  |d CHVBK  |d OCLCO  |d OCLCF  |d OCLCQ  |d LVT  |d UKAHL  |d OCLCQ  |d UX1  |d K6U  |d NLW  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1048119203  |a 1055261671  |a 1175620989 
020 |a 9781788990073 
020 |a 1788990072 
020 |a 9781788995979 
020 |a 178899597X  |q (Trade Paper) 
024 3 |a 9781788995979 
029 1 |a AU@  |b 000066231006 
029 1 |a CHNEW  |b 001024199 
029 1 |a CHVBK  |b 530305097 
035 |a (OCoLC)1048817635  |z (OCoLC)1048119203  |z (OCoLC)1055261671  |z (OCoLC)1175620989 
037 |a B10167  |b 01201872 
050 4 |a QA76.88  |b .J646 2018 
082 0 4 |a 004.35 
049 |a UAMI 
100 1 |a John, Tomcy. 
245 1 0 |a Hands-On Spring Security 5 for Reactive Applications :  |b Learn Effective Ways to Secure Your Applications with Spring and Spring WebFlux. 
260 |a Birmingham :  |b Packt Publishing Ltd,  |c 2018. 
300 |a 1 online resource (262 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright and Credits; Dedication; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Overview of Spring 5 and Spring Security 5; How examples are structured; New-generation application requirements; Reactive programming; Reactive applications; Reactive Manifesto; Responsive; Resilient; Elastic; Message-driven; Spring Framework; Reactive Landscape in Java; Reactive Streams and Reactive Streams Specifications; Non-blocking; Backpressure; Reactive Extensions; RxJava; Reactive Streams and RxJava; JDK 9 additions; Important interfaces; The Publisher Interface. 
505 8 |a The Subscriber InterfaceThe Subscription interface; The Processor interface; Spring Framework and reactive applications; Modules in Reactor; Reactive types in Reactor Core; The Flux reative type; The Mono reactive type; Data stream types; Reactor and RxJava; Reactive Web Application; Spring WebFlux; Reactive Spring Web; WebClient; WebSockets; Application security; Spring Security; Spring Security terminologies; Spring Security's core features; Authentication; Authorization; Spring Security 5's new features; Working of Spring Security; Servlet Filter; Filter Chain. 
505 8 |a Security Interceptor (DelegatingFilterProxy)Core Spring Security modules; Summary; Chapter 2: Deep Diving into Spring Security; Authentication; Setting up AuthenticationManager; AuthenticationProvider; Custom AuthenticationProvider; Multiple AuthenticationProvider; Sample application; Base project setup; Step 1-Create a Maven project in IntelliJ IDEA; Step 2-pom.xml changes; Step 3-MySQL database schema setup; Step 4-Setting up MySQL database properties in your project; Step 5-Spring application configuration; Step 6-Web application configuration; Step 7-Spring MVC setup. 
505 8 |a Step 8-Controller setupStep 9-JSP creation; Spring Security setup; Step 1-Spring Security configuration setup; Step 2-Spring Security setup for a web application; Running the application; In-memory user storage; Run as Spring Boot; Authorization; Web URL; Method invocation; Domain instance; Other Spring Security capabilities; Summary; Chapter 3: Authentication Using SAML, LDAP, and OAuth/OIDC; Security Assertion Markup Language; Setting up an SSO provider; Setting up the project; The pom.xml file setup; The application.yml file setup; The Spring Security configuration files. 
505 8 |a The resources folder setupRunning and testing the application; Lightweight Directory Access Protocol; Set up dependencies in the pom.xml file; Spring Security configuration; LDAP server setup; Setting up users in the LDAP server; Running the application; Seeing the application in action on a browser; OAuth2 and OpenID Connect; Setting up a project; Bootstrap Spring project using Spring Initializr; Inclusion of OAuth libraries in pom.xml; Setting up provider details in application.properties; Provider setup; Default application change; The HomeController class; The home.jsp file. 
500 |a Spring Boot main application class change. 
520 |a Security is one of the most vital concerns for any organization. The complexity of an application is compounded when you need to integrate security with existing code, new technology, and other frameworks. This book will show you how to effectively write Java code that is robust and easy to maintain. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a High performance computing. 
650 0 |a Application software  |x Development. 
650 6 |a Superinformatique. 
650 6 |a Logiciels d'application  |x Développement. 
650 7 |a Enterprise software.  |2 bicssc 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Programming & scripting languages: general.  |2 bicssc 
650 7 |a Computers  |x Enterprise Applications  |x General.  |2 bisacsh 
650 7 |a Computers  |x Security  |x General.  |2 bisacsh 
650 7 |a Computers  |x Programming Languages  |x Java.  |2 bisacsh 
650 7 |a Application software  |x Development  |2 fast 
650 7 |a High performance computing  |2 fast 
776 0 8 |i Print version:  |a John, Tomcy.  |t Hands-On Spring Security 5 for Reactive Applications : Learn Effective Ways to Secure Your Applications with Spring and Spring WebFlux.  |d Birmingham : Packt Publishing Ltd, ©2018  |z 9781788995979 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5485026  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n BDZ0037629802 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5485026 
938 |a YBP Library Services  |b YANK  |n 15625724 
994 |a 92  |b IZTAP