Inicio > > > Software empresarial > Spring Security - Third Edition
Spring Security - Third Edition

Spring Security - Third Edition

Spring Security - Third Edition

Mick Knutson / Peter Mularien / ROBERT WILLIAM WINCH / Robert Winch

94,89 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2017
Materia
Software empresarial
ISBN:
9781787129511
94,89 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Learn how to secure your Java applications from hackers using Spring Security 4.2Key FeaturesArchitect solutions that leverage the full power of Spring Security while remaining loosely coupled.Implement various scenarios such as supporting existing user stores, user sign up, authentication, and supporting AJAX requests,Integrate with popular Microservice and Cloud services such as Zookeeper, Eureka, and Consul, along with advanced techniques, including OAuth, JSON Web Token’s (JWS), Hashing, and encryption algorithmsBook DescriptionKnowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressured concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to easily secure your Java application with the tried and trusted Spring Security framework, a powerful and highly customizable authentication and access-control framework.The book starts by integrating a variety of authentication mechanisms. It then demonstrates how to properly restrict access to your application. It also covers tips on integrating with some of the more popular web frameworks. An example of how Spring Security defends against session fixation, moves into concurrency control, and how you can utilize session management for administrative functions is also included.It concludes with advanced security scenarios for RESTful webservices and microservices, detailing the issues surrounding stateless authentication, and demonstrates a concise, step-by-step approach to solving those issues. And, by the end of the book, readers can rest assured that integrating version 4.2 of Spring Security will be a seamless endeavor from start to finish. What you will learnUnderstand common security vulnerabilities and how to resolve themLearn to perform initial penetration testing to uncover common security vulnerabilitiesImplement authentication and authorizationLearn to utilize existing corporate infrastructure such as LDAP, Active Directory, Kerberos, CAS, OpenID, and OAuthIntegrate with popular frameworks such as Spring, Spring-Boot, Spring-Data, JSF, Vaaden, jQuery, and AngularJS.Gain deep understanding of the security challenges with RESTful webservices and microservice architecturesIntegrate Spring with other security infrastructure components like LDAP, Apache Directory server and SAMLWho this book is for:This book is intended for Java Web and/or RESTful webservice developers and assumes a basic understanding of creating Java 8, Java Web and/or RESTful webservice applications, XML, and the Spring Framework. You are not expected to have any previous experience with Spring Security.

Artículos relacionados

  • Innovations in XML Applications and Metadata Management
    As new concepts such as virtualization, cloud computing, and web applications continue to emerge, XML has begun to assume the role as the universal language for communication among contrasting systems that grow throughout the internet. Innovations in XML Applications and Metadata Management: Advancing Technologies addresses the functionality between XML and its related technolo...
  • THEORY AND PRACTICE OF COMPUTATION
    MASAYUKI NUMAO JAIME SHIN-YA NISHIZAKI / NISHIZAKI SHIN-YA
     This is the proceedings of the Third Workshop on Computing: Theory and Practice, WCTP 2013 devoted to theoretical and practical approaches to computation. This workshop was organized by four top universities in Japan and the Philippines: Tokyo Institute of Technology, Osaka University, University of the Philippines — Diliman, and De La Salle University. The proceedings provide...
  • React 16 Tooling
    Adam Boduch
    ...
    Disponible

    69,99 €

  • HP Certified Systems Administrator (2nd Edition)
    Asghar Ghori
    Like the first edition of this book, the second edition also covers three main objectives ¿ to provide a comprehensive resource to individuals, including novice, IT/Non-HP-UX administrators, and HP-UX administrators who intend to take the new HP Certified Systems Administrator exam HP0-095 and pass it; to provide a quick and valuable on-the-job resource to HP-UX administrators,...
    Disponible

    58,77 €

  • Build your own Programming Language - Second Edition
    Clinton L. Jeffery / Imran Ahmad
    Learn to design your own programming language in a hands-on way by building compilers, using preprocessors, transpilers, and more, in this fully-refreshed second edition, written by the creator of the Unicon programming language.Purchase of the print or Kindle book includes a free PDF eBookKey Features- Takes a hands-on approach; learn by building the Jzero language, a subset o...
    Disponible

    74,14 €

  • Hands-On Unity Game Development - Fourth Edition
    Juan Gabriel Gomila Salas / Nicolas Alejandro Borromeo
    Unlock game development mastery with Unity 2023! This book takes you from conception to publication, equipping you with the key tools and techniques you need to bring your gaming vision to life.Key FeaturesLearn the fundamentals of Unity 2023 and create your dream gameExplore the world of augmented reality (AR) to create captivating mobile gamesPropel game performance and playe...
    Disponible

    73,58 €