Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484250525
    Language: English
    Pages: 1 online resource (424 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security, Second Edition has been updated to incorporate the changes in Spring Framework 5 and Spring Boot 2. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up. This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications. What You Will Learn Explore the scope of security and how to use the Spring Security Framework Master Spring security architecture and design Secure the web tier in Spring Work with alternative authentication providers Take advantage of business objects and logic security Extend Spring security with other frameworks and languages Secure the service layer Who This Book Is For Experienced Spring and Java developers with prior experience in building Spring Framework or Boot-based applications.
    Note: Online resource; Title from title page (viewed November 21, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [New York] : Apress
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Series Statement: The expert's voice in Spring
    Keywords: Application software ; Security measures ; Application software ; Development ; Java (Computer program language) ; Web site development ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications by using the Spring Security Framework. Provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications. What you'll learn What the basics of securing a Java application, including core security concepts and the step-by-step configuration to include the Spring Security Framework in your web application What tools are available in Spring security to provide login and logout capabilities, with add-ons such as remember-me and password change functionalities. What are the types of authentication mechanisms tailored for enterprise-level Java applications, including LDAP, the Central Authentication Service, OpenID and X.509. How to dive into each of the application layers to control user access to the different architectural elements of your Java application. You will first apply authorization control to each of the components of the Model-View-Controller tier. How to work with Domain Objects and RESTful web services in our authorization queue in order to fully secure our application by using Access Control Lists, along with Object Level and Method Level authorization. How to explore the powerful Grails framework and how to use Spring security in the context of a Groovy on Grails application. You will earn about the core security plugin and others such as OpenID, Facebook and Twitter authentication. Who this book is for This book is for Java and Grails developers who would like to secure their applications easily by applying industry's best practices. I assume a fair knowledge of Java and a basic knowledge of Spring Dependency Injection.
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed June 11, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9798868800351
    Language: English
    Pages: 1 online resource (301 pages) , illustrations
    Edition: Third edition.
    Parallel Title: Erscheint auch als
    Keywords: Application software Security measures ; Application software Development ; Java (Computer program language) ; Web site development ; Computer networks Security measures
    Abstract: Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security, Third Edition has been updated to incorporate the changes in Spring Framework 6 and Spring Boot 3. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up. This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and JSON Web Token applications.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...