Cargando…

Spring Security.

Learn how to secure your Java applications from hackers using Spring Security 4.2 About This Book Architect solutions that leverage the full power of Spring Security while remaining loosely coupled. Implement various scenarios such as supporting existing user stores, user sign up, authentication, an...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Knutson, Mick
Otros Autores: Winch, Robert, Mularien, Peter
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2017.
Edición:3rd ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBSCO_on1014439573
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|---|||||
008 171209s2017 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d NLE  |d MERUC  |d UIU  |d OCLCO  |d OCLCF  |d YDX  |d COO  |d OCLCA  |d OCLCQ  |d UOK  |d OCLCQ  |d WYU  |d C6I  |d UKAHL  |d VT2  |d OCLCQ  |d UKMGB  |d N$T  |d OCLCQ  |d UKBTH  |d BTN  |d NLW  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB7N5938  |2 bnb 
016 7 |a 018639283  |2 Uk 
019 |a 1013967050  |a 1019734191  |a 1125068493  |a 1159606581  |a 1264915162 
020 |a 1787126463 
020 |a 9781787129511 
020 |a 1787129519 
020 |a 9781787126466  |q (electronic bk.) 
024 8 |a 9781787129511 
029 1 |a AU@  |b 000066232611 
029 1 |a UKMGB  |b 018639283 
035 |a (OCoLC)1014439573  |z (OCoLC)1013967050  |z (OCoLC)1019734191  |z (OCoLC)1125068493  |z (OCoLC)1159606581  |z (OCoLC)1264915162 
037 |a 9781787126466  |b Packt Publishing Pvt. Ltd 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Knutson, Mick. 
245 1 0 |a Spring Security. 
250 |a 3rd ed. 
260 |a Birmingham :  |b Packt Publishing,  |c 2017. 
300 |a 1 online resource (530 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
588 0 |a Print version record. 
520 |a Learn how to secure your Java applications from hackers using Spring Security 4.2 About This Book Architect solutions that leverage the full power of Spring Security while remaining loosely coupled. Implement various scenarios such as supporting existing user stores, user sign up, authentication, and supporting AJAX requests, Integrate with popular Microservice and Cloud services such as Zookeeper, Eureka, and Consul, along with advanced techniques, including OAuth, JSON Web Token's (JWS), Hashing, and encryption algorithms Who This Book Is For This book is intended for Java Web and/or RESTful webservice developers and assumes a basic understanding of creating Java 8, Java Web and/or RESTful webservice applications, XML, and the Spring Framework. You are not expected to have any previous experience with Spring Security. What You Will Learn Understand common security vulnerabilities and how to resolve them Learn to perform initial penetration testing to uncover common security vulnerabilities Implement authentication and authorization Learn to utilize existing corporate infrastructure such as LDAP, Active Directory, Kerberos, CAS, OpenID, and OAuth Integrate with popular frameworks such as Spring, Spring-Boot, Spring-Data, JSF, Vaaden, jQuery, and AngularJS. Gain deep understanding of the security challenges with RESTful webservices and microservice architectures Integrate Spring with other security infrastructure components like LDAP, Apache Directory server and SAML In Detail Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressured concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to easily secure your Java application with the tried and trusted Spring Security framework, a powerful and highly customizable authentication and access-control framework. The book starts by integrating a variety of authentication mechanisms. It then demonstrates how to properly restrict access to your application. It also covers tips on integrating with some of the more popular web frameworks. An example of how Spring Security defends against session fixation, moves into concurrency control, and how you can utilize session management for administrative functions is also included. It concludes with advanced security scenarios for REST ... 
542 |f Copyright © 2017 Packt Publishing  |g 2017 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security  |x Management. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a COMPUTERS  |x Programming Languages  |x Java.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Enterprise Applications  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
700 1 |a Winch, Robert. 
700 1 |a Mularien, Peter. 
776 0 8 |i Print version:  |a Knutson, Mick.  |t Spring Security - Third Edition.  |d Birmingham : Packt Publishing, ©2017 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1641399  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n BDZ0035833805 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5165113 
938 |a EBSCOhost  |b EBSC  |n 1641399 
938 |a YBP Library Services  |b YANK  |n 15018422 
994 |a 92  |b IZTAP