|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn798669679 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
120710s2012 caua o 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d CUS
|d OCLCO
|d COO
|d WAU
|d YDXCP
|d DEBSZ
|d NLE
|d OCLCQ
|d OCLCO
|d EBLCP
|d N$T
|d TEFOD
|d AU@
|d OCLCO
|d TEFOD
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d FEM
|d NRC
|d OCLCQ
|d OCLCO
|d OCLCF
|d BRL
|d CEF
|d MOQ
|d UAB
|d UKAHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 779828647
|a 880883000
|a 968046920
|a 969002858
|
020 |
|
|
|a 9781449331627
|q (electronic bk.)
|
020 |
|
|
|a 1449331629
|q (electronic bk.)
|
020 |
|
|
|a 9781449317843
|
020 |
|
|
|a 1449317847
|
020 |
|
|
|a 9781449331610
|q (electronic bk.)
|
020 |
|
|
|a 1449331610
|q (electronic bk.)
|
020 |
|
|
|z 9781449311605
|q (pbk.)
|
020 |
|
|
|z 1449311601
|q (pbk.)
|
029 |
1 |
|
|a AU@
|b 000049904247
|
029 |
1 |
|
|a AU@
|b 000052907229
|
029 |
1 |
|
|a DEBBG
|b BV040901646
|
029 |
1 |
|
|a DEBSZ
|b 378289977
|
029 |
1 |
|
|a DEBSZ
|b 381376869
|
029 |
1 |
|
|a DEBSZ
|b 397251556
|
029 |
1 |
|
|a GBVCP
|b 747216053
|
029 |
1 |
|
|a AU@
|b 000062629303
|
035 |
|
|
|a (OCoLC)798669679
|z (OCoLC)779828647
|z (OCoLC)880883000
|z (OCoLC)968046920
|z (OCoLC)969002858
|
037 |
|
|
|a CL0500000152
|b Safari Books Online
|
037 |
|
|
|a 56896B77-4276-49F0-9F17-00D15D1D957A
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9
|b .B69 2012eb
|
072 |
|
7 |
|a EDU
|x 039000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Boyd, Ryan.
|
245 |
1 |
0 |
|a Getting started with OAuth 2.0 /
|c Ryan Boyd.
|
246 |
3 |
0 |
|a OAuth 2.0
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Sebastopol, CA :
|b O'Reilly,
|c ©2012.
|
300 |
|
|
|a 1 online resource (x, 66 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|2 rda
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Table of Contents; Preface; Conventions Used in This Book; Using Code Examples; Safari® Books Online; How to Contact Us; Acknowledgments; Chapter 1. Introduction; How OAuth Was Born; Why Developers Should Care About OAuth; Why Don't These APIs Just Use Passwords for Authorization?; Terminology; Authentication; Federated Authentication; Authorization; Delegated Authorization; Roles; The Great Debate over Signatures; Mitigating Concerns with Bearer Tokens; Signing Your OAuth 2.0 Requests; Getting the key; Making API requests; Developer and Application Registration.
|
505 |
8 |
|
|a Why Is Registration Necessary?Client Profiles, Access Tokens, and Authorization Flows; Client Profiles; Access Tokens; Authorization Flows; Chapter 2. Server-Side Web Application Flow; When Should the Authorization Code Flow Be Used?; Security Properties; User Experience; Step-by-Step; Step 1: Let the user know what you're doing and request authorization; Error handling; Step 2: Exchange authorization code for an access token; Why both access tokens and refresh tokens?; Step 3: Call the API; Error handling; Step 4a: Refresh the access token; Step 4b: Obtaining a new access token.
|
505 |
8 |
|
|a How Can Access Be Revoked?Chapter 3. Client-Side Web Applications Flow; When Should the Implicit Grant Flow Be Used?; Limitations of the Implicit Grant Flow; Security Properties; User Experience; Step-by-Step; Step 1: Let the user know what you're doing and request authorization; Error handling; Step 2: Parsing the access token from the URL; Step 3: Call the API; Step 4: Refreshing the access token; How Can Access Be Revoked?; Chapter 4. Resource Owner Password Flow; When Should the Resource Owner Password Flow Be Used?; Security Properties; User Experience; Step-by-Step.
|
505 |
8 |
|
|a Step 1: Ask the user for their credentialsStep 2: Exchange the credentials for an access token; Step 3: Call the API; Step 4: Refresh the access token; Chapter 5. Client Credentials Flow; When Should the Client Credentials Flow Be Used?; What APIs Support the Client Credentials Flow?; How Does the Client Authenticate?; Security Properties; Step-by-Step; Step 1: Exchange the application's credentials for an access token; Step 2: Call the API; When the Access Token Expires; Chapter 6. Getting Access to User Data from Mobile Apps; Why You Should Use OAuth for Native Mobile Apps.
|
505 |
8 |
|
|a What Flow Should Be Used for Native Mobile Apps?Do You Have a Mobile Backend Web Server for Your Application?; The (Ugly) Web Browser; Embedded WebView; System Web Browser; Enhanced Mobile App Authorization for Specific Providers; For Google; For Facebook; Chapter 7. OpenID Connect Authentication; ID Token; Security Properties; Obtaining User Authorization; Check ID Endpoint; UserInfo Endpoint; Performance Improvements; Practical OpenID Connect; For Google; For Facebook; OpenID Connect Evolution; Chapter 8. Tools and Libraries; Google's OAuth 2.0 Playground; Google's TokenInfo Endpoint.
|
520 |
|
|
|a Whether you develop web applications or mobile apps, the OAuth 2.0 protocol will save a lot of headaches. This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users' data--such as user profiles, photos, videos, and contact lists--to improve their experience of your application. Through code examples, step-by-step instructions, and use-case examples, you'll learn how to apply OAuth 2.0 to your server-side web application, client-side app, or mobile app. Find out what it takes to access social graphs, st.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a OAuth.
|
630 |
0 |
7 |
|a OAuth.
|2 blmlsh
|
650 |
|
0 |
|a Application program interfaces (Computer software)
|
650 |
|
0 |
|a World Wide Web
|x Security measures.
|
650 |
|
0 |
|a Web services
|x Access control.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Interfaces de programmation d'applications.
|
650 |
|
6 |
|a Web
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Services Web
|x Accès
|x Contrôle.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a APIs (interfaces)
|2 aat
|
650 |
|
7 |
|a EDUCATION
|x Computers & Technology.
|2 bisacsh
|
650 |
|
7 |
|a Application program interfaces (Computer software)
|2 fast
|0 (OCoLC)fst00811704
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a World Wide Web
|x Security measures.
|2 fast
|0 (OCoLC)fst01181329
|
776 |
0 |
8 |
|i Print version: Boyd, Ryan.
|t Getting started with OAuth 2.0.
|b 1st ed.
|d Sebastopol, CA : O'Reilly, ©2012
|z 9781449311605
|w (OCoLC)764382903
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781449317843/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH22930951
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH23071379
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL867855
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 438224
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7475581
|
994 |
|
|
|a 92
|b IZTAP
|