Cargando…

Hands-on Spring security 5.1.1 /

"Securing your application from hackers is the most high-pressure concerns for developers. In this course, you'll learn how to protect your Java application from malicious attacks and users with the Spring Security framework. You'll integrate Spring Security into your application usin...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Lelek, Tomasz (Orador)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Packt Publishing, 2019.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1090680908
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 190326s2019 xx 077 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d OCLCQ  |d OCLCO 
029 1 |a AU@  |b 000071520255 
035 |a (OCoLC)1090680908 
037 |a CL0501000036  |b Safari Books Online 
050 4 |a QA76.76.A65 
049 |a UAMI 
100 1 |a Lelek, Tomasz,  |e speaker. 
245 1 0 |a Hands-on Spring security 5.1.1 /  |c Tomasz Lelek. 
246 3 |a Hands-on Spring security five point one point one 
264 1 |a [Place of publication not identified] :  |b Packt Publishing,  |c 2019. 
300 |a 1 online resource (1 streaming video file (1 hr., 16 min., 49 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
511 0 |a Presenter, Tomasz Lelek. 
500 |a Title from resource description page (Safari, viewed March 26, 2019). 
520 |a "Securing your application from hackers is the most high-pressure concerns for developers. In this course, you'll learn how to protect your Java application from malicious attacks and users with the Spring Security framework. You'll integrate Spring Security into your application using the Spring frameworks through practical, hands-on examples. You'll see how to secure your web application, integrate authentication and authorization mechanisms, and restrict access to your application. You'll discover how to integrate it with popular frameworks such as Spring Web MVC, Spring-Boot, Spring-Data, Servlet API injection, and more. We'll cover the security challenges with Reactive web apps built for the cloud, RESTful web services, and microservice architectures with the Spring framework. You'll also implement techniques for protection against attacks such as session fixation, clickjacking, cross-site request forgery, and more. By the end of the course, you'll understand common security vulnerabilities and be able to prevent them with Spring Security, with an empirical approach to securing your web applications."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Spring (Software framework) 
630 0 7 |a Spring (Software framework)  |2 fast  |0 (OCoLC)fst01938500 
650 0 |a Application software  |x Development. 
650 0 |a Web applications  |x Security measures. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Logiciels d'application  |x Développement. 
650 6 |a Applications Web  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Application software  |x Development.  |2 fast  |0 (OCoLC)fst00811707 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
856 4 0 |u https://learning.oreilly.com/videos/~/9781789802931/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP