|
|
|
|
LEADER |
00000cgm a2200000 i 4500 |
001 |
OR_on1090680908 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
190326s2019 xx 077 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d OCLCQ
|d OCLCO
|
029 |
1 |
|
|a AU@
|b 000071520255
|
035 |
|
|
|a (OCoLC)1090680908
|
037 |
|
|
|a CL0501000036
|b Safari Books Online
|
050 |
|
4 |
|a QA76.76.A65
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Lelek, Tomasz,
|e speaker.
|
245 |
1 |
0 |
|a Hands-on Spring security 5.1.1 /
|c Tomasz Lelek.
|
246 |
3 |
|
|a Hands-on Spring security five point one point one
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Packt Publishing,
|c 2019.
|
300 |
|
|
|a 1 online resource (1 streaming video file (1 hr., 16 min., 49 sec.))
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
511 |
0 |
|
|a Presenter, Tomasz Lelek.
|
500 |
|
|
|a Title from resource description page (Safari, viewed March 26, 2019).
|
520 |
|
|
|a "Securing your application from hackers is the most high-pressure concerns for developers. In this course, you'll learn how to protect your Java application from malicious attacks and users with the Spring Security framework. You'll integrate Spring Security into your application using the Spring frameworks through practical, hands-on examples. You'll see how to secure your web application, integrate authentication and authorization mechanisms, and restrict access to your application. You'll discover how to integrate it with popular frameworks such as Spring Web MVC, Spring-Boot, Spring-Data, Servlet API injection, and more. We'll cover the security challenges with Reactive web apps built for the cloud, RESTful web services, and microservice architectures with the Spring framework. You'll also implement techniques for protection against attacks such as session fixation, clickjacking, cross-site request forgery, and more. By the end of the course, you'll understand common security vulnerabilities and be able to prevent them with Spring Security, with an empirical approach to securing your web applications."--Resource description page
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Spring (Software framework)
|
630 |
0 |
7 |
|a Spring (Software framework)
|2 fast
|0 (OCoLC)fst01938500
|
650 |
|
0 |
|a Application software
|x Development.
|
650 |
|
0 |
|a Web applications
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Logiciels d'application
|x Développement.
|
650 |
|
6 |
|a Applications Web
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Application software
|x Development.
|2 fast
|0 (OCoLC)fst00811707
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781789802931/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|