Cargando…

OAuth 2 in action /

This book teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Richer, Justin (Autor), Sanso, Antonio (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Shelter Island, NY : Manning Publications, [2017]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn985707693
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 170505s2017 nyua o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d TOH  |d COO  |d VT2  |d OCLCF  |d CEF  |d KSU  |d OCLCQ  |d UAB  |d K6U  |d YDX  |d EBLCP  |d OCLCO  |d OCLCQ 
020 |a 161729327X 
020 |a 9781617293276 
020 |z 9781617293276 
029 1 |a GBVCP  |b 1004861656 
035 |a (OCoLC)985707693 
037 |a CL0500000855  |b Safari Books Online 
050 4 |a QA76.76.A63 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Richer, Justin,  |e author. 
245 1 0 |a OAuth 2 in action /  |c Justin Richer, Antonio Sanso. 
246 3 |a OAuth two in action 
264 1 |a Shelter Island, NY :  |b Manning Publications,  |c [2017] 
264 4 |c ©2017 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed May 4, 2017). 
500 |a Includes index. 
505 0 |a What is OAuth 2.0 and why should you care? -- The OAuth dance -- Building a simple OAuth client -- Building a simple OAuth protected resource -- Building a simple OAuth authorization server -- OAuth 2.0 in the real world -- Common client vulnerabilities -- Common protected resources vulnerabilities -- Common authorization server vulnerabilities -- Common OAuth token vulnerabilities -- OAuth tokens -- Dynamic client registration -- User authentication with OAuth 2.0 -- Protocols and profiles using OAuth 2.0 -- Beyond bearer tokens -- Summary and conclusions. 
520 |a This book teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Application program interfaces (Computer software) 
650 0 |a World Wide Web  |x Security measures. 
650 0 |a Web services  |x Access control. 
650 0 |a Data protection. 
650 6 |a Interfaces de programmation d'applications. 
650 6 |a Web  |x Sécurité  |x Mesures. 
650 6 |a Services Web  |x Accès  |x Contrôle. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a APIs (interfaces)  |2 aat 
650 7 |a Application program interfaces (Computer software)  |2 fast  |0 (OCoLC)fst00811704 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a World Wide Web  |x Security measures.  |2 fast  |0 (OCoLC)fst01181329 
700 1 |a Sanso, Antonio,  |e author. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781617293276/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6642791 
938 |a YBP Library Services  |b YANK  |n 302272827 
994 |a 92  |b IZTAP