Spring Security 3.1:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Pub.
2012
|
Schriftenreihe: | Community experience distilled
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Configuring JdbcUserDetailsManager to use groups Table of Contents; Spring Security 3.1; Spring Security 3.1; Credits; About the Author; Acknowledgement; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Anatomy of an Unsafe Application; Security audit; About the sample application; The JBCP calendar application architecture; Application technology Reviewing the audit resultsAuthentication; Authorization; Database credential security; Sensitive information; Transport-level protection; Using Spring Security 3.1 to address security concerns; Why Spring Security; Summary; 2. Getting Started with Spring Security; Hello Spring Security; Importing the sample application; Updating your dependencies; Using Spring 3.1 and Spring Security 3.1; Implementing a Spring Security XML configuration file; Updating your web.xml file; ContextLoaderListener; ContextLoaderListener versus DispatcherServlet; springSecurityFilterChain; DelegatingFilterProxy FilterChainProxyRunning a secured application; Common problems; A little bit of polish; Customizing login; Configuring logout; The page isn't redirecting properly; Basic role-based authorization; Expression-based authorization; Conditionally displaying authentication information; Customizing the behavior after login; Summary; 3. Custom Authentication; JBCP Calendar architecture; CalendarUser; Event; CalendarService; UserContext; SpringSecurityUserContext; Logging in new users using SecurityContextHolder; Managing users in Spring Security; Logging in a new user to an application Updating SignupControllerCreating a custom UserDetailsService object; CalendarUserDetailsService; Configuring UserDetailsService; Removing references to UserDetailsManager; CalendarUserDetails; SpringSecurityUserContext simplifications; Displaying custom user attributes; Creating a custom AuthenticationProvider object; CalendarUserAuthenticationProvider; Configuring CalendarUserAuthenticationProvider; Authenticating with different parameters; DomainUsernamePasswordAuthenticationToken; Updating CalendarUserAuthenticationProvider; Adding domain to the login page DomainUsernamePasswordAuthenticationFilterUpdating our configuration; Which authentication method to use; Summary; 4. JDBC-based Authentication; Using Spring Security's default JDBC authentication; Required dependencies; Using the H2 database; Provided JDBC scripts; Configuring the H2-embedded database; Configuring JDBC UserDetailsManager; Spring Security's default user schema; Defining users; Defining user authorities; UserDetailsManager; What other features does UserDetailsManager provide out of the box; Group-based access control; Configuring group-based access control This practical step-by-step tutorial has plenty of example code coupled with the necessary screenshots and clear narration so that grasping content is made easier and quicker. This book is intended for Java web developers and assumes a basic understanding of creating Java web applications, XML, and the Spring Framework. You are not assumed to have any previous experience with Spring Security |
Beschreibung: | 1 Online-Ressource (950 pages) |
ISBN: | 1621989070 1849518262 1849518270 9781621989073 9781849518260 9781849518277 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043086508 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2012 |||| o||u| ||||||eng d | ||
020 | |a 1621989070 |c electronic bk. |9 1-62198-907-0 | ||
020 | |a 1849518262 |9 1-84951-826-2 | ||
020 | |a 1849518270 |c electronic bk. |9 1-84951-827-0 | ||
020 | |a 9781621989073 |c electronic bk. |9 978-1-62198-907-3 | ||
020 | |a 9781849518260 |9 978-1-84951-826-0 | ||
020 | |a 9781849518260 |9 978-1-84951-826-0 | ||
020 | |a 9781849518277 |c electronic bk. |9 978-1-84951-827-7 | ||
035 | |a (OCoLC)823719166 | ||
035 | |a (DE-599)BVBBV043086508 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 006.76 | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Winch, Robert |e Verfasser |4 aut | |
245 | 1 | 0 | |a Spring Security 3.1 |
264 | 1 | |a Birmingham |b Packt Pub. |c 2012 | |
300 | |a 1 Online-Ressource (950 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Community experience distilled | |
500 | |a Configuring JdbcUserDetailsManager to use groups | ||
500 | |a Table of Contents; Spring Security 3.1; Spring Security 3.1; Credits; About the Author; Acknowledgement; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Anatomy of an Unsafe Application; Security audit; About the sample application; The JBCP calendar application architecture; Application technology | ||
500 | |a Reviewing the audit resultsAuthentication; Authorization; Database credential security; Sensitive information; Transport-level protection; Using Spring Security 3.1 to address security concerns; Why Spring Security; Summary; 2. Getting Started with Spring Security; Hello Spring Security; Importing the sample application; Updating your dependencies; Using Spring 3.1 and Spring Security 3.1; Implementing a Spring Security XML configuration file; Updating your web.xml file; ContextLoaderListener; ContextLoaderListener versus DispatcherServlet; springSecurityFilterChain; DelegatingFilterProxy | ||
500 | |a FilterChainProxyRunning a secured application; Common problems; A little bit of polish; Customizing login; Configuring logout; The page isn't redirecting properly; Basic role-based authorization; Expression-based authorization; Conditionally displaying authentication information; Customizing the behavior after login; Summary; 3. Custom Authentication; JBCP Calendar architecture; CalendarUser; Event; CalendarService; UserContext; SpringSecurityUserContext; Logging in new users using SecurityContextHolder; Managing users in Spring Security; Logging in a new user to an application | ||
500 | |a Updating SignupControllerCreating a custom UserDetailsService object; CalendarUserDetailsService; Configuring UserDetailsService; Removing references to UserDetailsManager; CalendarUserDetails; SpringSecurityUserContext simplifications; Displaying custom user attributes; Creating a custom AuthenticationProvider object; CalendarUserAuthenticationProvider; Configuring CalendarUserAuthenticationProvider; Authenticating with different parameters; DomainUsernamePasswordAuthenticationToken; Updating CalendarUserAuthenticationProvider; Adding domain to the login page | ||
500 | |a DomainUsernamePasswordAuthenticationFilterUpdating our configuration; Which authentication method to use; Summary; 4. JDBC-based Authentication; Using Spring Security's default JDBC authentication; Required dependencies; Using the H2 database; Provided JDBC scripts; Configuring the H2-embedded database; Configuring JDBC UserDetailsManager; Spring Security's default user schema; Defining users; Defining user authorities; UserDetailsManager; What other features does UserDetailsManager provide out of the box; Group-based access control; Configuring group-based access control | ||
500 | |a This practical step-by-step tutorial has plenty of example code coupled with the necessary screenshots and clear narration so that grasping content is made easier and quicker. This book is intended for Java web developers and assumes a basic understanding of creating Java web applications, XML, and the Spring Framework. You are not assumed to have any previous experience with Spring Security | ||
650 | 4 | |a Computer crimes / Prevention | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Malware (Computer software) / Prevention | |
650 | 4 | |a Web sites / Design | |
650 | 4 | |a Web sites / Security measures | |
650 | 7 | |a COMPUTERS / Web / Web Programming |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Malware (Computer software) |x Prevention | |
650 | 4 | |a Web sites |x Design | |
650 | 4 | |a Web sites |x Security measures | |
700 | 1 | |a Mularien, Peter |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=526166 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028510700 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=526166 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=526166 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175483303100416 |
---|---|
any_adam_object | |
author | Winch, Robert |
author_facet | Winch, Robert |
author_role | aut |
author_sort | Winch, Robert |
author_variant | r w rw |
building | Verbundindex |
bvnumber | BV043086508 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)823719166 (DE-599)BVBBV043086508 |
dewey-full | 006.76 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods 005 - Computer programming, programs, data, security |
dewey-raw | 006.76 005.8 |
dewey-search | 006.76 005.8 |
dewey-sort | 16.76 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05764nmm a2200661zc 4500</leader><controlfield tag="001">BV043086508</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1621989070</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-62198-907-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849518262</subfield><subfield code="9">1-84951-826-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849518270</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84951-827-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781621989073</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-62198-907-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849518260</subfield><subfield code="9">978-1-84951-826-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849518260</subfield><subfield code="9">978-1-84951-826-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849518277</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84951-827-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)823719166</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043086508</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.76</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Winch, Robert</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Spring Security 3.1</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Pub.</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (950 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Configuring JdbcUserDetailsManager to use groups</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Table of Contents; Spring Security 3.1; Spring Security 3.1; Credits; About the Author; Acknowledgement; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Anatomy of an Unsafe Application; Security audit; About the sample application; The JBCP calendar application architecture; Application technology</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Reviewing the audit resultsAuthentication; Authorization; Database credential security; Sensitive information; Transport-level protection; Using Spring Security 3.1 to address security concerns; Why Spring Security; Summary; 2. Getting Started with Spring Security; Hello Spring Security; Importing the sample application; Updating your dependencies; Using Spring 3.1 and Spring Security 3.1; Implementing a Spring Security XML configuration file; Updating your web.xml file; ContextLoaderListener; ContextLoaderListener versus DispatcherServlet; springSecurityFilterChain; DelegatingFilterProxy</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">FilterChainProxyRunning a secured application; Common problems; A little bit of polish; Customizing login; Configuring logout; The page isn't redirecting properly; Basic role-based authorization; Expression-based authorization; Conditionally displaying authentication information; Customizing the behavior after login; Summary; 3. Custom Authentication; JBCP Calendar architecture; CalendarUser; Event; CalendarService; UserContext; SpringSecurityUserContext; Logging in new users using SecurityContextHolder; Managing users in Spring Security; Logging in a new user to an application</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Updating SignupControllerCreating a custom UserDetailsService object; CalendarUserDetailsService; Configuring UserDetailsService; Removing references to UserDetailsManager; CalendarUserDetails; SpringSecurityUserContext simplifications; Displaying custom user attributes; Creating a custom AuthenticationProvider object; CalendarUserAuthenticationProvider; Configuring CalendarUserAuthenticationProvider; Authenticating with different parameters; DomainUsernamePasswordAuthenticationToken; Updating CalendarUserAuthenticationProvider; Adding domain to the login page</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">DomainUsernamePasswordAuthenticationFilterUpdating our configuration; Which authentication method to use; Summary; 4. JDBC-based Authentication; Using Spring Security's default JDBC authentication; Required dependencies; Using the H2 database; Provided JDBC scripts; Configuring the H2-embedded database; Configuring JDBC UserDetailsManager; Spring Security's default user schema; Defining users; Defining user authorities; UserDetailsManager; What other features does UserDetailsManager provide out of the box; Group-based access control; Configuring group-based access control</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This practical step-by-step tutorial has plenty of example code coupled with the necessary screenshots and clear narration so that grasping content is made easier and quicker. This book is intended for Java web developers and assumes a basic understanding of creating Java web applications, XML, and the Spring Framework. You are not assumed to have any previous experience with Spring Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software) / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites / Design</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Web / Web Programming</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites</subfield><subfield code="x">Design</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mularien, Peter</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=526166</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028510700</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=526166</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=526166</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043086508 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:00Z |
institution | BVB |
isbn | 1621989070 1849518262 1849518270 9781621989073 9781849518260 9781849518277 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028510700 |
oclc_num | 823719166 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (950 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Packt Pub. |
record_format | marc |
series2 | Community experience distilled |
spelling | Winch, Robert Verfasser aut Spring Security 3.1 Birmingham Packt Pub. 2012 1 Online-Ressource (950 pages) txt rdacontent c rdamedia cr rdacarrier Community experience distilled Configuring JdbcUserDetailsManager to use groups Table of Contents; Spring Security 3.1; Spring Security 3.1; Credits; About the Author; Acknowledgement; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Anatomy of an Unsafe Application; Security audit; About the sample application; The JBCP calendar application architecture; Application technology Reviewing the audit resultsAuthentication; Authorization; Database credential security; Sensitive information; Transport-level protection; Using Spring Security 3.1 to address security concerns; Why Spring Security; Summary; 2. Getting Started with Spring Security; Hello Spring Security; Importing the sample application; Updating your dependencies; Using Spring 3.1 and Spring Security 3.1; Implementing a Spring Security XML configuration file; Updating your web.xml file; ContextLoaderListener; ContextLoaderListener versus DispatcherServlet; springSecurityFilterChain; DelegatingFilterProxy FilterChainProxyRunning a secured application; Common problems; A little bit of polish; Customizing login; Configuring logout; The page isn't redirecting properly; Basic role-based authorization; Expression-based authorization; Conditionally displaying authentication information; Customizing the behavior after login; Summary; 3. Custom Authentication; JBCP Calendar architecture; CalendarUser; Event; CalendarService; UserContext; SpringSecurityUserContext; Logging in new users using SecurityContextHolder; Managing users in Spring Security; Logging in a new user to an application Updating SignupControllerCreating a custom UserDetailsService object; CalendarUserDetailsService; Configuring UserDetailsService; Removing references to UserDetailsManager; CalendarUserDetails; SpringSecurityUserContext simplifications; Displaying custom user attributes; Creating a custom AuthenticationProvider object; CalendarUserAuthenticationProvider; Configuring CalendarUserAuthenticationProvider; Authenticating with different parameters; DomainUsernamePasswordAuthenticationToken; Updating CalendarUserAuthenticationProvider; Adding domain to the login page DomainUsernamePasswordAuthenticationFilterUpdating our configuration; Which authentication method to use; Summary; 4. JDBC-based Authentication; Using Spring Security's default JDBC authentication; Required dependencies; Using the H2 database; Provided JDBC scripts; Configuring the H2-embedded database; Configuring JDBC UserDetailsManager; Spring Security's default user schema; Defining users; Defining user authorities; UserDetailsManager; What other features does UserDetailsManager provide out of the box; Group-based access control; Configuring group-based access control This practical step-by-step tutorial has plenty of example code coupled with the necessary screenshots and clear narration so that grasping content is made easier and quicker. This book is intended for Java web developers and assumes a basic understanding of creating Java web applications, XML, and the Spring Framework. You are not assumed to have any previous experience with Spring Security Computer crimes / Prevention Computer networks / Security measures Malware (Computer software) / Prevention Web sites / Design Web sites / Security measures COMPUTERS / Web / Web Programming bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes Prevention Computer networks Security measures Malware (Computer software) Prevention Web sites Design Web sites Security measures Mularien, Peter Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=526166 Aggregator Volltext |
spellingShingle | Winch, Robert Spring Security 3.1 Computer crimes / Prevention Computer networks / Security measures Malware (Computer software) / Prevention Web sites / Design Web sites / Security measures COMPUTERS / Web / Web Programming bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes Prevention Computer networks Security measures Malware (Computer software) Prevention Web sites Design Web sites Security measures |
title | Spring Security 3.1 |
title_auth | Spring Security 3.1 |
title_exact_search | Spring Security 3.1 |
title_full | Spring Security 3.1 |
title_fullStr | Spring Security 3.1 |
title_full_unstemmed | Spring Security 3.1 |
title_short | Spring Security 3.1 |
title_sort | spring security 3 1 |
topic | Computer crimes / Prevention Computer networks / Security measures Malware (Computer software) / Prevention Web sites / Design Web sites / Security measures COMPUTERS / Web / Web Programming bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes Prevention Computer networks Security measures Malware (Computer software) Prevention Web sites Design Web sites Security measures |
topic_facet | Computer crimes / Prevention Computer networks / Security measures Malware (Computer software) / Prevention Web sites / Design Web sites / Security measures COMPUTERS / Web / Web Programming COMPUTERS / Networking / Security COMPUTERS / Security / General Computer crimes Prevention Computer networks Security measures Malware (Computer software) Prevention Web sites Design Web sites Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=526166 |
work_keys_str_mv | AT winchrobert springsecurity31 AT mularienpeter springsecurity31 |