|
|
|
|
LEADER |
00000cgm a22000007a 4500 |
001 |
OR_on1235779087 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cn||||||||| |
007 |
vz czazuu |
008 |
210201s2020 xx --- o vleng d |
040 |
|
|
|a TOH
|b eng
|c TOH
|d OCLCO
|d NZCPL
|d OCLCF
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1232117884
|a 1305879795
|
020 |
|
|
|a 9781800560000
|
020 |
|
|
|a 1800560001
|
024 |
8 |
|
|a 9781800560000
|
029 |
1 |
|
|a AU@
|b 000068846149
|
035 |
|
|
|a (OCoLC)1235779087
|z (OCoLC)1232117884
|z (OCoLC)1305879795
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Thompson, John,
|e author.
|
245 |
1 |
0 |
|a Spring Security Core :
|b Beginner to Guru /
|c Thompson, John.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b Packt Publishing,
|c 2020.
|
300 |
|
|
|a 1 online resource (1 video file, approximately 10 hr., 48 min.)
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a video file
|
365 |
|
|
|b 99.99
|
520 |
|
|
|a Understand how to protect Java framework applications by learning cutting-edge Spring Security techniques About This Video Gain a deep understanding of Spring Security Explore the Spring Security toolset for authentication and authorization of users Become familiar with the Test-Driven Development (TDD) approach In Detail Increasing cases of online security breaches have made it important for every organization to ensure that their applications are secure. With this video course, you'll explore Spring Security techniques that'll help you in authenticating and authorizing users, and protecting your applications from hazardous security breaches. The course begins with an introduction to Spring Security, enabling you to understand its importance in securing framework applications. You'll leverage the auto-configuration capabilities of Spring Boot to secure a web application using HTTP basic authentication. Next, you'll learn how to replace and customize the default Spring Boot auto-configuration with the help of a series of exercises. Moving ahead, you'll discover the unique security aspects in a Spring Boot web application that mimics a robust monolithic application with web pages and RESTful endpoints. Later, you'll follow a Test-Driven Development (TDD) approach to understand the features of Spring Security. With the help of interesting examples, you'll also be able to write a failing test using JUnit 5, Mockito, and Spring MockMVC By the end of this video course, you'll have developed the skills you need to use Spring Security to secure your framework applications.
|
542 |
|
|
|f Packt Publishing
|g 2020
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
0 |
|
|a Online resource; Title from title screen (viewed September 30, 2020).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
710 |
2 |
|
|a O'Reilly for Higher Education (Firm),
|e distributor.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781800560000/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|