|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
KNOVEL_ocn823719166 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
130109s2012 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d UMI
|d OCLCO
|d YDXCP
|d OCLCQ
|d COO
|d N$T
|d IDEBK
|d KNOVL
|d DEBSZ
|d OCLCO
|d OCLCQ
|d KNOVL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d JBG
|d AGLDB
|d OCLCQ
|d MERUC
|d OCLCQ
|d OCLCA
|d ZCU
|d OCLCF
|d VTS
|d CEF
|d ICG
|d OCLCQ
|d FEM
|d OCLCQ
|d STF
|d UAB
|d DKC
|d OCLCQ
|d M8D
|d UKAHL
|d OCLCQ
|d AJS
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 826647024
|a 969082748
|a 1086964331
|a 1264906238
|a 1297167953
|a 1297429878
|
020 |
|
|
|a 9781849518277
|q (electronic bk.)
|
020 |
|
|
|a 1849518270
|q (electronic bk.)
|
020 |
|
|
|a 9781621989073
|q (electronic bk.)
|
020 |
|
|
|a 1621989070
|q (electronic bk.)
|
020 |
|
|
|a 1849518262
|
020 |
|
|
|a 9781849518260
|
020 |
|
|
|z 9781849518260
|
029 |
1 |
|
|a AU@
|b 000050591039
|
029 |
1 |
|
|a DEBBG
|b BV041121117
|
029 |
1 |
|
|a DEBBG
|b BV043086508
|
029 |
1 |
|
|a DEBBG
|b BV044171928
|
029 |
1 |
|
|a DEBSZ
|b 396760430
|
029 |
1 |
|
|a DEBSZ
|b 397460333
|
029 |
1 |
|
|a DEBSZ
|b 421281219
|
035 |
|
|
|a (OCoLC)823719166
|z (OCoLC)826647024
|z (OCoLC)969082748
|z (OCoLC)1086964331
|z (OCoLC)1264906238
|z (OCoLC)1297167953
|z (OCoLC)1297429878
|
037 |
|
|
|a CL0500000187
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|
072 |
|
7 |
|a COM
|x 060160
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|a 006.76
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Winch, Robert.
|
245 |
1 |
0 |
|a Spring Security 3.1.
|
260 |
|
|
|a Birmingham :
|b Packt Pub.,
|c 2012.
|
300 |
|
|
|a 1 online resource (950 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|2 rda
|
490 |
1 |
|
|a Community experience distilled
|
505 |
0 |
|
|a Table of Contents; Spring Security 3.1; Spring Security 3.1; Credits; About the Author; Acknowledgement; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Anatomy of an Unsafe Application; Security audit; About the sample application; The JBCP calendar application architecture; Application technology.
|
505 |
8 |
|
|a Reviewing the audit resultsAuthentication; Authorization; Database credential security; Sensitive information; Transport-level protection; Using Spring Security 3.1 to address security concerns; Why Spring Security; Summary; 2. Getting Started with Spring Security; Hello Spring Security; Importing the sample application; Updating your dependencies; Using Spring 3.1 and Spring Security 3.1; Implementing a Spring Security XML configuration file; Updating your web.xml file; ContextLoaderListener; ContextLoaderListener versus DispatcherServlet; springSecurityFilterChain; DelegatingFilterProxy.
|
505 |
8 |
|
|a FilterChainProxyRunning a secured application; Common problems; A little bit of polish; Customizing login; Configuring logout; The page isn't redirecting properly; Basic role-based authorization; Expression-based authorization; Conditionally displaying authentication information; Customizing the behavior after login; Summary; 3. Custom Authentication; JBCP Calendar architecture; CalendarUser; Event; CalendarService; UserContext; SpringSecurityUserContext; Logging in new users using SecurityContextHolder; Managing users in Spring Security; Logging in a new user to an application.
|
505 |
8 |
|
|a Updating SignupControllerCreating a custom UserDetailsService object; CalendarUserDetailsService; Configuring UserDetailsService; Removing references to UserDetailsManager; CalendarUserDetails; SpringSecurityUserContext simplifications; Displaying custom user attributes; Creating a custom AuthenticationProvider object; CalendarUserAuthenticationProvider; Configuring CalendarUserAuthenticationProvider; Authenticating with different parameters; DomainUsernamePasswordAuthenticationToken; Updating CalendarUserAuthenticationProvider; Adding domain to the login page.
|
505 |
8 |
|
|a DomainUsernamePasswordAuthenticationFilterUpdating our configuration; Which authentication method to use; Summary; 4. JDBC-based Authentication; Using Spring Security's default JDBC authentication; Required dependencies; Using the H2 database; Provided JDBC scripts; Configuring the H2-embedded database; Configuring JDBC UserDetailsManager; Spring Security's default user schema; Defining users; Defining user authorities; UserDetailsManager; What other features does UserDetailsManager provide out of the box; Group-based access control; Configuring group-based access control.
|
520 |
|
|
|a This practical step-by-step tutorial has plenty of example code coupled with the necessary screenshots and clear narration so that grasping content is made easier and quicker. This book is intended for Java web developers and assumes a basic understanding of creating Java web applications, XML, and the Spring Framework. You are not assumed to have any previous experience with Spring Security.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Malware (Computer software)
|x Prevention.
|
650 |
|
0 |
|a Web sites
|x Design.
|
650 |
|
0 |
|a Web sites
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sites Web
|x Conception.
|
650 |
|
6 |
|a Sites Web
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Web
|x Web Programming.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|x Prevention
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Web sites
|x Design
|2 fast
|
650 |
|
7 |
|a Web sites
|x Security measures
|2 fast
|
700 |
1 |
|
|a Mularien, Peter.
|
776 |
0 |
8 |
|i Print version:
|a Winch, Robert.
|t Spring Security 3.1.
|d Birmingham : Packt Publishing, ©2012
|z 9781849518260
|
830 |
|
0 |
|a Community experience distilled.
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpSS000021/toc
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26943885
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 526166
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis24508797
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9971101
|
994 |
|
|
|a 92
|b IZTAP
|