Cargando…

Spring Security 3.1.

This practical step-by-step tutorial has plenty of example code coupled with the necessary screenshots and clear narration so that grasping content is made easier and quicker. This book is intended for Java web developers and assumes a basic understanding of creating Java web applications, XML, and...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Winch, Robert
Otros Autores: Mularien, Peter
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Pub., 2012.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 KNOVEL_ocn823719166
003 OCoLC
005 20231027140348.0
006 m o d
007 cr |n|||||||||
008 130109s2012 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d UMI  |d OCLCO  |d YDXCP  |d OCLCQ  |d COO  |d N$T  |d IDEBK  |d KNOVL  |d DEBSZ  |d OCLCO  |d OCLCQ  |d KNOVL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d JBG  |d AGLDB  |d OCLCQ  |d MERUC  |d OCLCQ  |d OCLCA  |d ZCU  |d OCLCF  |d VTS  |d CEF  |d ICG  |d OCLCQ  |d FEM  |d OCLCQ  |d STF  |d UAB  |d DKC  |d OCLCQ  |d M8D  |d UKAHL  |d OCLCQ  |d AJS  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 826647024  |a 969082748  |a 1086964331  |a 1264906238  |a 1297167953  |a 1297429878 
020 |a 9781849518277  |q (electronic bk.) 
020 |a 1849518270  |q (electronic bk.) 
020 |a 9781621989073  |q (electronic bk.) 
020 |a 1621989070  |q (electronic bk.) 
020 |a 1849518262 
020 |a 9781849518260 
020 |z 9781849518260 
029 1 |a AU@  |b 000050591039 
029 1 |a DEBBG  |b BV041121117 
029 1 |a DEBBG  |b BV043086508 
029 1 |a DEBBG  |b BV044171928 
029 1 |a DEBSZ  |b 396760430 
029 1 |a DEBSZ  |b 397460333 
029 1 |a DEBSZ  |b 421281219 
035 |a (OCoLC)823719166  |z (OCoLC)826647024  |z (OCoLC)969082748  |z (OCoLC)1086964331  |z (OCoLC)1264906238  |z (OCoLC)1297167953  |z (OCoLC)1297429878 
037 |a CL0500000187  |b Safari Books Online 
050 4 |a TK5105.59 
072 7 |a COM  |x 060160  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |a 006.76 
049 |a UAMI 
100 1 |a Winch, Robert. 
245 1 0 |a Spring Security 3.1. 
260 |a Birmingham :  |b Packt Pub.,  |c 2012. 
300 |a 1 online resource (950 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
490 1 |a Community experience distilled 
505 0 |a Table of Contents; Spring Security 3.1; Spring Security 3.1; Credits; About the Author; Acknowledgement; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Anatomy of an Unsafe Application; Security audit; About the sample application; The JBCP calendar application architecture; Application technology. 
505 8 |a Reviewing the audit resultsAuthentication; Authorization; Database credential security; Sensitive information; Transport-level protection; Using Spring Security 3.1 to address security concerns; Why Spring Security; Summary; 2. Getting Started with Spring Security; Hello Spring Security; Importing the sample application; Updating your dependencies; Using Spring 3.1 and Spring Security 3.1; Implementing a Spring Security XML configuration file; Updating your web.xml file; ContextLoaderListener; ContextLoaderListener versus DispatcherServlet; springSecurityFilterChain; DelegatingFilterProxy. 
505 8 |a FilterChainProxyRunning a secured application; Common problems; A little bit of polish; Customizing login; Configuring logout; The page isn't redirecting properly; Basic role-based authorization; Expression-based authorization; Conditionally displaying authentication information; Customizing the behavior after login; Summary; 3. Custom Authentication; JBCP Calendar architecture; CalendarUser; Event; CalendarService; UserContext; SpringSecurityUserContext; Logging in new users using SecurityContextHolder; Managing users in Spring Security; Logging in a new user to an application. 
505 8 |a Updating SignupControllerCreating a custom UserDetailsService object; CalendarUserDetailsService; Configuring UserDetailsService; Removing references to UserDetailsManager; CalendarUserDetails; SpringSecurityUserContext simplifications; Displaying custom user attributes; Creating a custom AuthenticationProvider object; CalendarUserAuthenticationProvider; Configuring CalendarUserAuthenticationProvider; Authenticating with different parameters; DomainUsernamePasswordAuthenticationToken; Updating CalendarUserAuthenticationProvider; Adding domain to the login page. 
505 8 |a DomainUsernamePasswordAuthenticationFilterUpdating our configuration; Which authentication method to use; Summary; 4. JDBC-based Authentication; Using Spring Security's default JDBC authentication; Required dependencies; Using the H2 database; Provided JDBC scripts; Configuring the H2-embedded database; Configuring JDBC UserDetailsManager; Spring Security's default user schema; Defining users; Defining user authorities; UserDetailsManager; What other features does UserDetailsManager provide out of the box; Group-based access control; Configuring group-based access control. 
520 |a This practical step-by-step tutorial has plenty of example code coupled with the necessary screenshots and clear narration so that grasping content is made easier and quicker. This book is intended for Java web developers and assumes a basic understanding of creating Java web applications, XML, and the Spring Framework. You are not assumed to have any previous experience with Spring Security. 
588 0 |a Print version record. 
590 |a Knovel  |b ACADEMIC - Software Engineering 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Malware (Computer software)  |x Prevention. 
650 0 |a Web sites  |x Design. 
650 0 |a Web sites  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sites Web  |x Conception. 
650 6 |a Sites Web  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Web  |x Web Programming.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Web sites  |x Design  |2 fast 
650 7 |a Web sites  |x Security measures  |2 fast 
700 1 |a Mularien, Peter. 
776 0 8 |i Print version:  |a Winch, Robert.  |t Spring Security 3.1.  |d Birmingham : Packt Publishing, ©2012  |z 9781849518260 
830 0 |a Community experience distilled. 
856 4 0 |u https://appknovel.uam.elogim.com/kn/resources/kpSS000021/toc  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26943885 
938 |a EBSCOhost  |b EBSC  |n 526166 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis24508797 
938 |a YBP Library Services  |b YANK  |n 9971101 
994 |a 92  |b IZTAP