|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn985707693 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
170505s2017 nyua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d TOH
|d COO
|d VT2
|d OCLCF
|d CEF
|d KSU
|d OCLCQ
|d UAB
|d K6U
|d YDX
|d EBLCP
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 161729327X
|
020 |
|
|
|a 9781617293276
|
020 |
|
|
|z 9781617293276
|
029 |
1 |
|
|a GBVCP
|b 1004861656
|
035 |
|
|
|a (OCoLC)985707693
|
037 |
|
|
|a CL0500000855
|b Safari Books Online
|
050 |
|
4 |
|a QA76.76.A63
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Richer, Justin,
|e author.
|
245 |
1 |
0 |
|a OAuth 2 in action /
|c Justin Richer, Antonio Sanso.
|
246 |
3 |
|
|a OAuth two in action
|
264 |
|
1 |
|a Shelter Island, NY :
|b Manning Publications,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed May 4, 2017).
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a What is OAuth 2.0 and why should you care? -- The OAuth dance -- Building a simple OAuth client -- Building a simple OAuth protected resource -- Building a simple OAuth authorization server -- OAuth 2.0 in the real world -- Common client vulnerabilities -- Common protected resources vulnerabilities -- Common authorization server vulnerabilities -- Common OAuth token vulnerabilities -- OAuth tokens -- Dynamic client registration -- User authentication with OAuth 2.0 -- Protocols and profiles using OAuth 2.0 -- Beyond bearer tokens -- Summary and conclusions.
|
520 |
|
|
|a This book teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Application program interfaces (Computer software)
|
650 |
|
0 |
|a World Wide Web
|x Security measures.
|
650 |
|
0 |
|a Web services
|x Access control.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Interfaces de programmation d'applications.
|
650 |
|
6 |
|a Web
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Services Web
|x Accès
|x Contrôle.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a APIs (interfaces)
|2 aat
|
650 |
|
7 |
|a Application program interfaces (Computer software)
|2 fast
|0 (OCoLC)fst00811704
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a World Wide Web
|x Security measures.
|2 fast
|0 (OCoLC)fst01181329
|
700 |
1 |
|
|a Sanso, Antonio,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781617293276/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6642791
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 302272827
|
994 |
|
|
|a 92
|b IZTAP
|