RESTful Java Web Services Security /:
In Detail This book will serve as a practical companion for you to learn about common vulnerabilities when using RESTful services, and will provide you with an indispensable knowledge of the tools you can use to implement and test security on your applications. It will cover the fine details of sett...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing,
2014.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | In Detail This book will serve as a practical companion for you to learn about common vulnerabilities when using RESTful services, and will provide you with an indispensable knowledge of the tools you can use to implement and test security on your applications. It will cover the fine details of setting up RESTful services such as implementing RESTEasy and securing transmission protocols such as the OAuth protocol and its integration with RESTEasy. Furthermore, it also explains the implementation of digital signatures and the integration of the Doseta framework with RESTEasy. With this book, you will be able to design your own security implementation or use a protocol to grant permissions over your RESTful applications with OAuth. You will also gain knowledge about the working of other features such as configuring and verifying HTTP and HTTPS protocols, certificates, and securing protocols for data transmission. By the end of this book, you will have comprehensive knowledge that will help you to detect and solve vulnerabilities. Approach A sequential and easy-to-follow guide which allows you to understand the concepts related to securing web apps/services quickly and efficiently, since each topic is explained and described with the help of an example and in a step-by-step manner, helping you to easily implement the examples in your own projects. Who this book is for This book is intended for web application developers who use RESTful web services to power their websites. Prior knowledge of RESTful is not mandatory, but would be advisable. |
Beschreibung: | 1 online resource |
ISBN: | 9781783980116 1783980117 1322008531 9781322008530 1783980109 9781783980109 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn885019799 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 140801s2014 enk o 000 0 eng d | ||
040 | |a IDEBK |b eng |e pn |c IDEBK |d EBLCP |d N$T |d DEBSZ |d OCLCQ |d OCLCF |d OCLCQ |d YDXCP |d TEFOD |d OCLCQ |d FEM |d AGLDB |d ICA |d ZCU |d XFH |d MERUC |d OCLCQ |d D6H |d VTS |d ICG |d AU@ |d OCLCQ |d STF |d DKC |d OCLCQ |d UKAHL |d OCLCQ |d K6U |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
019 | |a 907254551 |a 968058531 |a 969054122 |a 994515332 | ||
020 | |a 9781783980116 |q (electronic bk.) | ||
020 | |a 1783980117 |q (electronic bk.) | ||
020 | |a 1322008531 |q (electronic bk.) | ||
020 | |a 9781322008530 |q (electronic bk.) | ||
020 | |a 1783980109 | ||
020 | |a 9781783980109 | ||
035 | |a (OCoLC)885019799 |z (OCoLC)907254551 |z (OCoLC)968058531 |z (OCoLC)969054122 |z (OCoLC)994515332 | ||
037 | |a 7A815C9A-69A3-4F8F-A73C-C61A2FA488B4 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a TK5105.59 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Enriquez, Rene. | |
245 | 1 | 0 | |a RESTful Java Web Services Security / |c Rene Enriquez. |
260 | |a Birmingham : |b Packt Publishing, |c 2014. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |2 rda | ||
588 | 0 | |a Print version record. | |
520 | |a In Detail This book will serve as a practical companion for you to learn about common vulnerabilities when using RESTful services, and will provide you with an indispensable knowledge of the tools you can use to implement and test security on your applications. It will cover the fine details of setting up RESTful services such as implementing RESTEasy and securing transmission protocols such as the OAuth protocol and its integration with RESTEasy. Furthermore, it also explains the implementation of digital signatures and the integration of the Doseta framework with RESTEasy. With this book, you will be able to design your own security implementation or use a protocol to grant permissions over your RESTful applications with OAuth. You will also gain knowledge about the working of other features such as configuring and verifying HTTP and HTTPS protocols, certificates, and securing protocols for data transmission. By the end of this book, you will have comprehensive knowledge that will help you to detect and solve vulnerabilities. Approach A sequential and easy-to-follow guide which allows you to understand the concepts related to securing web apps/services quickly and efficiently, since each topic is explained and described with the help of an example and in a step-by-step manner, helping you to easily implement the examples in your own projects. Who this book is for This book is intended for web application developers who use RESTful web services to power their websites. Prior knowledge of RESTful is not mandatory, but would be advisable. | ||
505 | 0 | |a Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Setting Up the Environment; Downloading tools; Downloading links; Creating the base project; First functional example; Testing the example web service; Summary; Chapter 2: The Importance of Securing Web Services; The importance of security; Security management options; Authorization and authentication; Authentication; Authorization; Access control; Transport layer security; Basic authentication by providing user credentials; Digest access authentication. | |
505 | 8 | |a An example with explanationAuthentication through certificates; API keys; Summary; Chapter 3: Security Management with RESTEasy; Fine-grained and coarse-grained security; Securing HTTP methods; HTTP method -- POST; HTTP method -- GET; Fine-grained security implementation through annotations; The @RolesAllowed annotation; The @DenyAll annotation; The @PermitAll annotation; Programmatical implementation of fine-grained security; Summary; Chapter 4: RESTEasy Skeleton Key; OAuth protocol; OAuth and RESTEasy Skeleton Key; What is RESTEasy Skeleton Key?; OAuth 2.0 authentication framework. | |
505 | 8 | |a Main featuresOAuth2 implementation; Updating RESTEasy modules in JBoss; Setting up the configuration in JBoss; Implementing an OAuth client; SSO configuration for security management; OAuth token via Basic Auth; Running the application; Custom filters; Server-side filters; Client-side filters; Example usage of filters; Summary; Chapter 5: Digital Signatures and Encryption of Messages; Digital signatures; Updating RESTEasy JAR files; Applying digital signatures; Testing the functionality; Validating signatures with annotations; Message body encryption; Testing the functionality. | |
505 | 8 | |a Enabling the server with HTTPSTesting the functionality; Summary; Index. | |
546 | |a English. | ||
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Web sites |x Security measures. | |
650 | 0 | |a Java (Computer program language) |0 http://id.loc.gov/authorities/subjects/sh95008574 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Sites Web |x Sécurité |x Mesures. | |
650 | 6 | |a Java (Langage de programmation) | |
650 | 7 | |a COMPUTERS |x Security |x Online Safety & Privacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x Networking. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Java (Computer program language) |2 fast | |
650 | 7 | |a Web sites |x Security measures |2 fast | |
650 | 7 | |a Engineering & Applied Sciences. |2 hilcc | |
650 | 7 | |a Computer Science. |2 hilcc | |
758 | |i has work: |a RESTful Java web services security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYDRJt39fQ49YKqvqg4j83 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Enriquez, Rene. |t RESTful Java Web Services Security. |d Packt Publishing 2014 |z 1322008531 |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=817631 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=817631 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH26942369 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL1756033 | ||
938 | |a EBSCOhost |b EBSC |n 817631 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis28705783 | ||
938 | |a YBP Library Services |b YANK |n 12008174 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn885019799 |
---|---|
_version_ | 1826942053769019392 |
adam_text | |
any_adam_object | |
author | Enriquez, Rene |
author_facet | Enriquez, Rene |
author_role | |
author_sort | Enriquez, Rene |
author_variant | r e re |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Setting Up the Environment; Downloading tools; Downloading links; Creating the base project; First functional example; Testing the example web service; Summary; Chapter 2: The Importance of Securing Web Services; The importance of security; Security management options; Authorization and authentication; Authentication; Authorization; Access control; Transport layer security; Basic authentication by providing user credentials; Digest access authentication. An example with explanationAuthentication through certificates; API keys; Summary; Chapter 3: Security Management with RESTEasy; Fine-grained and coarse-grained security; Securing HTTP methods; HTTP method -- POST; HTTP method -- GET; Fine-grained security implementation through annotations; The @RolesAllowed annotation; The @DenyAll annotation; The @PermitAll annotation; Programmatical implementation of fine-grained security; Summary; Chapter 4: RESTEasy Skeleton Key; OAuth protocol; OAuth and RESTEasy Skeleton Key; What is RESTEasy Skeleton Key?; OAuth 2.0 authentication framework. Main featuresOAuth2 implementation; Updating RESTEasy modules in JBoss; Setting up the configuration in JBoss; Implementing an OAuth client; SSO configuration for security management; OAuth token via Basic Auth; Running the application; Custom filters; Server-side filters; Client-side filters; Example usage of filters; Summary; Chapter 5: Digital Signatures and Encryption of Messages; Digital signatures; Updating RESTEasy JAR files; Applying digital signatures; Testing the functionality; Validating signatures with annotations; Message body encryption; Testing the functionality. Enabling the server with HTTPSTesting the functionality; Summary; Index. |
ctrlnum | (OCoLC)885019799 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06598cam a2200745 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn885019799</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">140801s2014 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IDEBK</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IDEBK</subfield><subfield code="d">EBLCP</subfield><subfield code="d">N$T</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">FEM</subfield><subfield code="d">AGLDB</subfield><subfield code="d">ICA</subfield><subfield code="d">ZCU</subfield><subfield code="d">XFH</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">907254551</subfield><subfield code="a">968058531</subfield><subfield code="a">969054122</subfield><subfield code="a">994515332</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783980116</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783980117</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1322008531</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781322008530</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783980109</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783980109</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)885019799</subfield><subfield code="z">(OCoLC)907254551</subfield><subfield code="z">(OCoLC)968058531</subfield><subfield code="z">(OCoLC)969054122</subfield><subfield code="z">(OCoLC)994515332</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">7A815C9A-69A3-4F8F-A73C-C61A2FA488B4</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Enriquez, Rene.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">RESTful Java Web Services Security /</subfield><subfield code="c">Rene Enriquez.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In Detail This book will serve as a practical companion for you to learn about common vulnerabilities when using RESTful services, and will provide you with an indispensable knowledge of the tools you can use to implement and test security on your applications. It will cover the fine details of setting up RESTful services such as implementing RESTEasy and securing transmission protocols such as the OAuth protocol and its integration with RESTEasy. Furthermore, it also explains the implementation of digital signatures and the integration of the Doseta framework with RESTEasy. With this book, you will be able to design your own security implementation or use a protocol to grant permissions over your RESTful applications with OAuth. You will also gain knowledge about the working of other features such as configuring and verifying HTTP and HTTPS protocols, certificates, and securing protocols for data transmission. By the end of this book, you will have comprehensive knowledge that will help you to detect and solve vulnerabilities. Approach A sequential and easy-to-follow guide which allows you to understand the concepts related to securing web apps/services quickly and efficiently, since each topic is explained and described with the help of an example and in a step-by-step manner, helping you to easily implement the examples in your own projects. Who this book is for This book is intended for web application developers who use RESTful web services to power their websites. Prior knowledge of RESTful is not mandatory, but would be advisable.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Setting Up the Environment; Downloading tools; Downloading links; Creating the base project; First functional example; Testing the example web service; Summary; Chapter 2: The Importance of Securing Web Services; The importance of security; Security management options; Authorization and authentication; Authentication; Authorization; Access control; Transport layer security; Basic authentication by providing user credentials; Digest access authentication.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">An example with explanationAuthentication through certificates; API keys; Summary; Chapter 3: Security Management with RESTEasy; Fine-grained and coarse-grained security; Securing HTTP methods; HTTP method -- POST; HTTP method -- GET; Fine-grained security implementation through annotations; The @RolesAllowed annotation; The @DenyAll annotation; The @PermitAll annotation; Programmatical implementation of fine-grained security; Summary; Chapter 4: RESTEasy Skeleton Key; OAuth protocol; OAuth and RESTEasy Skeleton Key; What is RESTEasy Skeleton Key?; OAuth 2.0 authentication framework.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Main featuresOAuth2 implementation; Updating RESTEasy modules in JBoss; Setting up the configuration in JBoss; Implementing an OAuth client; SSO configuration for security management; OAuth token via Basic Auth; Running the application; Custom filters; Server-side filters; Client-side filters; Example usage of filters; Summary; Chapter 5: Digital Signatures and Encryption of Messages; Digital signatures; Updating RESTEasy JAR files; Applying digital signatures; Testing the functionality; Validating signatures with annotations; Message body encryption; Testing the functionality.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Enabling the server with HTTPSTesting the functionality; Summary; Index.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web sites</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Java (Computer program language)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh95008574</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sites Web</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Java (Langage de programmation)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Online Safety & Privacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Networking.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Java (Computer program language)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web sites</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Engineering & Applied Sciences.</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer Science.</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">RESTful Java web services security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYDRJt39fQ49YKqvqg4j83</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Enriquez, Rene.</subfield><subfield code="t">RESTful Java Web Services Security.</subfield><subfield code="d">Packt Publishing 2014</subfield><subfield code="z">1322008531</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=817631</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=817631</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH26942369</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1756033</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">817631</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis28705783</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12008174</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn885019799 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:21:54Z |
institution | BVB |
isbn | 9781783980116 1783980117 1322008531 9781322008530 1783980109 9781783980109 |
language | English |
oclc_num | 885019799 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Enriquez, Rene. RESTful Java Web Services Security / Rene Enriquez. Birmingham : Packt Publishing, 2014. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier text file rda Print version record. In Detail This book will serve as a practical companion for you to learn about common vulnerabilities when using RESTful services, and will provide you with an indispensable knowledge of the tools you can use to implement and test security on your applications. It will cover the fine details of setting up RESTful services such as implementing RESTEasy and securing transmission protocols such as the OAuth protocol and its integration with RESTEasy. Furthermore, it also explains the implementation of digital signatures and the integration of the Doseta framework with RESTEasy. With this book, you will be able to design your own security implementation or use a protocol to grant permissions over your RESTful applications with OAuth. You will also gain knowledge about the working of other features such as configuring and verifying HTTP and HTTPS protocols, certificates, and securing protocols for data transmission. By the end of this book, you will have comprehensive knowledge that will help you to detect and solve vulnerabilities. Approach A sequential and easy-to-follow guide which allows you to understand the concepts related to securing web apps/services quickly and efficiently, since each topic is explained and described with the help of an example and in a step-by-step manner, helping you to easily implement the examples in your own projects. Who this book is for This book is intended for web application developers who use RESTful web services to power their websites. Prior knowledge of RESTful is not mandatory, but would be advisable. Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Setting Up the Environment; Downloading tools; Downloading links; Creating the base project; First functional example; Testing the example web service; Summary; Chapter 2: The Importance of Securing Web Services; The importance of security; Security management options; Authorization and authentication; Authentication; Authorization; Access control; Transport layer security; Basic authentication by providing user credentials; Digest access authentication. An example with explanationAuthentication through certificates; API keys; Summary; Chapter 3: Security Management with RESTEasy; Fine-grained and coarse-grained security; Securing HTTP methods; HTTP method -- POST; HTTP method -- GET; Fine-grained security implementation through annotations; The @RolesAllowed annotation; The @DenyAll annotation; The @PermitAll annotation; Programmatical implementation of fine-grained security; Summary; Chapter 4: RESTEasy Skeleton Key; OAuth protocol; OAuth and RESTEasy Skeleton Key; What is RESTEasy Skeleton Key?; OAuth 2.0 authentication framework. Main featuresOAuth2 implementation; Updating RESTEasy modules in JBoss; Setting up the configuration in JBoss; Implementing an OAuth client; SSO configuration for security management; OAuth token via Basic Auth; Running the application; Custom filters; Server-side filters; Client-side filters; Example usage of filters; Summary; Chapter 5: Digital Signatures and Encryption of Messages; Digital signatures; Updating RESTEasy JAR files; Applying digital signatures; Testing the functionality; Validating signatures with annotations; Message body encryption; Testing the functionality. Enabling the server with HTTPSTesting the functionality; Summary; Index. English. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Web sites Security measures. Java (Computer program language) http://id.loc.gov/authorities/subjects/sh95008574 Réseaux d'ordinateurs Sécurité Mesures. Sites Web Sécurité Mesures. Java (Langage de programmation) COMPUTERS Security Online Safety & Privacy. bisacsh COMPUTERS Security Networking. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Java (Computer program language) fast Web sites Security measures fast Engineering & Applied Sciences. hilcc Computer Science. hilcc has work: RESTful Java web services security (Text) https://id.oclc.org/worldcat/entity/E39PCYDRJt39fQ49YKqvqg4j83 https://id.oclc.org/worldcat/ontology/hasWork Print version: Enriquez, Rene. RESTful Java Web Services Security. Packt Publishing 2014 1322008531 |
spellingShingle | Enriquez, Rene RESTful Java Web Services Security / Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Setting Up the Environment; Downloading tools; Downloading links; Creating the base project; First functional example; Testing the example web service; Summary; Chapter 2: The Importance of Securing Web Services; The importance of security; Security management options; Authorization and authentication; Authentication; Authorization; Access control; Transport layer security; Basic authentication by providing user credentials; Digest access authentication. An example with explanationAuthentication through certificates; API keys; Summary; Chapter 3: Security Management with RESTEasy; Fine-grained and coarse-grained security; Securing HTTP methods; HTTP method -- POST; HTTP method -- GET; Fine-grained security implementation through annotations; The @RolesAllowed annotation; The @DenyAll annotation; The @PermitAll annotation; Programmatical implementation of fine-grained security; Summary; Chapter 4: RESTEasy Skeleton Key; OAuth protocol; OAuth and RESTEasy Skeleton Key; What is RESTEasy Skeleton Key?; OAuth 2.0 authentication framework. Main featuresOAuth2 implementation; Updating RESTEasy modules in JBoss; Setting up the configuration in JBoss; Implementing an OAuth client; SSO configuration for security management; OAuth token via Basic Auth; Running the application; Custom filters; Server-side filters; Client-side filters; Example usage of filters; Summary; Chapter 5: Digital Signatures and Encryption of Messages; Digital signatures; Updating RESTEasy JAR files; Applying digital signatures; Testing the functionality; Validating signatures with annotations; Message body encryption; Testing the functionality. Enabling the server with HTTPSTesting the functionality; Summary; Index. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Web sites Security measures. Java (Computer program language) http://id.loc.gov/authorities/subjects/sh95008574 Réseaux d'ordinateurs Sécurité Mesures. Sites Web Sécurité Mesures. Java (Langage de programmation) COMPUTERS Security Online Safety & Privacy. bisacsh COMPUTERS Security Networking. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Java (Computer program language) fast Web sites Security measures fast Engineering & Applied Sciences. hilcc Computer Science. hilcc |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh95008574 |
title | RESTful Java Web Services Security / |
title_auth | RESTful Java Web Services Security / |
title_exact_search | RESTful Java Web Services Security / |
title_full | RESTful Java Web Services Security / Rene Enriquez. |
title_fullStr | RESTful Java Web Services Security / Rene Enriquez. |
title_full_unstemmed | RESTful Java Web Services Security / Rene Enriquez. |
title_short | RESTful Java Web Services Security / |
title_sort | restful java web services security |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Web sites Security measures. Java (Computer program language) http://id.loc.gov/authorities/subjects/sh95008574 Réseaux d'ordinateurs Sécurité Mesures. Sites Web Sécurité Mesures. Java (Langage de programmation) COMPUTERS Security Online Safety & Privacy. bisacsh COMPUTERS Security Networking. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Java (Computer program language) fast Web sites Security measures fast Engineering & Applied Sciences. hilcc Computer Science. hilcc |
topic_facet | Computer networks Security measures. Web sites Security measures. Java (Computer program language) Réseaux d'ordinateurs Sécurité Mesures. Sites Web Sécurité Mesures. Java (Langage de programmation) COMPUTERS Security Online Safety & Privacy. COMPUTERS Security Networking. COMPUTERS Security General. Computer networks Security measures Web sites Security measures Engineering & Applied Sciences. Computer Science. |
work_keys_str_mv | AT enriquezrene restfuljavawebservicessecurity |