Spring Security.:
Learn how to secure your Java applications from hackers using Spring Security 4.2 About This Book Architect solutions that leverage the full power of Spring Security while remaining loosely coupled. Implement various scenarios such as supporting existing user stores, user sign up, authentication, an...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing,
2017.
|
Ausgabe: | 3rd ed. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Learn how to secure your Java applications from hackers using Spring Security 4.2 About This Book Architect solutions that leverage the full power of Spring Security while remaining loosely coupled. Implement various scenarios such as supporting existing user stores, user sign up, authentication, and supporting AJAX requests, Integrate with popular Microservice and Cloud services such as Zookeeper, Eureka, and Consul, along with advanced techniques, including OAuth, JSON Web Token's (JWS), Hashing, and encryption algorithms Who This Book Is For This book is intended for Java Web and/or RESTful webservice developers and assumes a basic understanding of creating Java 8, Java Web and/or RESTful webservice applications, XML, and the Spring Framework. You are not expected to have any previous experience with Spring Security. What You Will Learn Understand common security vulnerabilities and how to resolve them Learn to perform initial penetration testing to uncover common security vulnerabilities Implement authentication and authorization Learn to utilize existing corporate infrastructure such as LDAP, Active Directory, Kerberos, CAS, OpenID, and OAuth Integrate with popular frameworks such as Spring, Spring-Boot, Spring-Data, JSF, Vaaden, jQuery, and AngularJS. Gain deep understanding of the security challenges with RESTful webservices and microservice architectures Integrate Spring with other security infrastructure components like LDAP, Apache Directory server and SAML In Detail Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressured concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to easily secure your Java application with the tried and trusted Spring Security framework, a powerful and highly customizable authentication and access-control framework. The book starts by integrating a variety of authentication mechanisms. It then demonstrates how to properly restrict access to your application. It also covers tips on integrating with some of the more popular web frameworks. An example of how Spring Security defends against session fixation, moves into concurrency control, and how you can utilize session management for administrative functions is also included. It concludes with advanced security scenarios for REST ... |
Beschreibung: | 1 online resource (530 pages) |
ISBN: | 1787126463 9781787129511 1787129519 9781787126466 |
Internformat
MARC
LEADER | 00000cam a2200000Mu 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-on1014439573 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 171209s2017 enk o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d NLE |d MERUC |d UIU |d OCLCO |d OCLCF |d YDX |d COO |d OCLCA |d OCLCQ |d UOK |d OCLCQ |d WYU |d C6I |d UKAHL |d VT2 |d OCLCQ |d UKMGB |d N$T |d OCLCQ |d UKBTH |d BTN |d NLW |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
015 | |a GBB7N5938 |2 bnb | ||
016 | 7 | |a 018639283 |2 Uk | |
019 | |a 1013967050 |a 1019734191 |a 1125068493 |a 1159606581 |a 1264915162 | ||
020 | |a 1787126463 | ||
020 | |a 9781787129511 | ||
020 | |a 1787129519 | ||
020 | |a 9781787126466 |q (electronic bk.) | ||
024 | 8 | |a 9781787129511 | |
035 | |a (OCoLC)1014439573 |z (OCoLC)1013967050 |z (OCoLC)1019734191 |z (OCoLC)1125068493 |z (OCoLC)1159606581 |z (OCoLC)1264915162 | ||
037 | |a 9781787126466 |b Packt Publishing Pvt. Ltd | ||
050 | 4 | |a TK5105.59 | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Knutson, Mick. | |
245 | 1 | 0 | |a Spring Security. |
250 | |a 3rd ed. | ||
260 | |a Birmingham : |b Packt Publishing, |c 2017. | ||
300 | |a 1 online resource (530 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
588 | 0 | |a Print version record. | |
520 | |a Learn how to secure your Java applications from hackers using Spring Security 4.2 About This Book Architect solutions that leverage the full power of Spring Security while remaining loosely coupled. Implement various scenarios such as supporting existing user stores, user sign up, authentication, and supporting AJAX requests, Integrate with popular Microservice and Cloud services such as Zookeeper, Eureka, and Consul, along with advanced techniques, including OAuth, JSON Web Token's (JWS), Hashing, and encryption algorithms Who This Book Is For This book is intended for Java Web and/or RESTful webservice developers and assumes a basic understanding of creating Java 8, Java Web and/or RESTful webservice applications, XML, and the Spring Framework. You are not expected to have any previous experience with Spring Security. What You Will Learn Understand common security vulnerabilities and how to resolve them Learn to perform initial penetration testing to uncover common security vulnerabilities Implement authentication and authorization Learn to utilize existing corporate infrastructure such as LDAP, Active Directory, Kerberos, CAS, OpenID, and OAuth Integrate with popular frameworks such as Spring, Spring-Boot, Spring-Data, JSF, Vaaden, jQuery, and AngularJS. Gain deep understanding of the security challenges with RESTful webservices and microservice architectures Integrate Spring with other security infrastructure components like LDAP, Apache Directory server and SAML In Detail Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressured concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to easily secure your Java application with the tried and trusted Spring Security framework, a powerful and highly customizable authentication and access-control framework. The book starts by integrating a variety of authentication mechanisms. It then demonstrates how to properly restrict access to your application. It also covers tips on integrating with some of the more popular web frameworks. An example of how Spring Security defends against session fixation, moves into concurrency control, and how you can utilize session management for administrative functions is also included. It concludes with advanced security scenarios for REST ... | ||
542 | |f Copyright © 2017 Packt Publishing |g 2017 | ||
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a Computer security |x Management. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859 | |
650 | 6 | |a Technologie de l'information |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique |x Gestion. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 7 | |a COMPUTERS |x Programming Languages |x Java. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Enterprise Applications |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |x Management |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Information technology |x Security measures |2 fast | |
700 | 1 | |a Winch, Robert. | |
700 | 1 | |a Mularien, Peter. |0 http://id.loc.gov/authorities/names/ns2012002069 | |
776 | 0 | 8 | |i Print version: |a Knutson, Mick. |t Spring Security - Third Edition. |d Birmingham : Packt Publishing, ©2017 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1641399 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n BDZ0035833805 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL5165113 | ||
938 | |a EBSCOhost |b EBSC |n 1641399 | ||
938 | |a YBP Library Services |b YANK |n 15018422 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-on1014439573 |
---|---|
_version_ | 1816796929360658433 |
adam_text | |
any_adam_object | |
author | Knutson, Mick |
author2 | Winch, Robert Mularien, Peter |
author2_role | |
author2_variant | r w rw p m pm |
author_GND | http://id.loc.gov/authorities/names/ns2012002069 |
author_facet | Knutson, Mick Winch, Robert Mularien, Peter |
author_role | |
author_sort | Knutson, Mick |
author_variant | m k mk |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBU |
ctrlnum | (OCoLC)1014439573 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 3rd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05436cam a2200697Mu 4500</leader><controlfield tag="001">ZDB-4-EBU-on1014439573</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|---|||||</controlfield><controlfield tag="008">171209s2017 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">NLE</subfield><subfield code="d">MERUC</subfield><subfield code="d">UIU</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">YDX</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UOK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">C6I</subfield><subfield code="d">UKAHL</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKMGB</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKBTH</subfield><subfield code="d">BTN</subfield><subfield code="d">NLW</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB7N5938</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">018639283</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1013967050</subfield><subfield code="a">1019734191</subfield><subfield code="a">1125068493</subfield><subfield code="a">1159606581</subfield><subfield code="a">1264915162</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1787126463</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781787129511</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1787129519</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781787126466</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">9781787129511</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1014439573</subfield><subfield code="z">(OCoLC)1013967050</subfield><subfield code="z">(OCoLC)1019734191</subfield><subfield code="z">(OCoLC)1125068493</subfield><subfield code="z">(OCoLC)1159606581</subfield><subfield code="z">(OCoLC)1264915162</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781787126466</subfield><subfield code="b">Packt Publishing Pvt. Ltd</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Knutson, Mick.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Spring Security.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">3rd ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2017.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (530 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Learn how to secure your Java applications from hackers using Spring Security 4.2 About This Book Architect solutions that leverage the full power of Spring Security while remaining loosely coupled. Implement various scenarios such as supporting existing user stores, user sign up, authentication, and supporting AJAX requests, Integrate with popular Microservice and Cloud services such as Zookeeper, Eureka, and Consul, along with advanced techniques, including OAuth, JSON Web Token's (JWS), Hashing, and encryption algorithms Who This Book Is For This book is intended for Java Web and/or RESTful webservice developers and assumes a basic understanding of creating Java 8, Java Web and/or RESTful webservice applications, XML, and the Spring Framework. You are not expected to have any previous experience with Spring Security. What You Will Learn Understand common security vulnerabilities and how to resolve them Learn to perform initial penetration testing to uncover common security vulnerabilities Implement authentication and authorization Learn to utilize existing corporate infrastructure such as LDAP, Active Directory, Kerberos, CAS, OpenID, and OAuth Integrate with popular frameworks such as Spring, Spring-Boot, Spring-Data, JSF, Vaaden, jQuery, and AngularJS. Gain deep understanding of the security challenges with RESTful webservices and microservice architectures Integrate Spring with other security infrastructure components like LDAP, Apache Directory server and SAML In Detail Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressured concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to easily secure your Java application with the tried and trusted Spring Security framework, a powerful and highly customizable authentication and access-control framework. The book starts by integrating a variety of authentication mechanisms. It then demonstrates how to properly restrict access to your application. It also covers tips on integrating with some of the more popular web frameworks. An example of how Spring Security defends against session fixation, moves into concurrency control, and how you can utilize session management for administrative functions is also included. It concludes with advanced security scenarios for REST ...</subfield></datafield><datafield tag="542" ind1=" " ind2=" "><subfield code="f">Copyright © 2017 Packt Publishing</subfield><subfield code="g">2017</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85035859</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Technologie de l'information</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Programming Languages</subfield><subfield code="x">Java.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Enterprise Applications</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Winch, Robert.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mularien, Peter.</subfield><subfield code="0">http://id.loc.gov/authorities/names/ns2012002069</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Knutson, Mick.</subfield><subfield code="t">Spring Security - Third Edition.</subfield><subfield code="d">Birmingham : Packt Publishing, ©2017</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1641399</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">BDZ0035833805</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5165113</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1641399</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">15018422</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBU-on1014439573 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:49:29Z |
institution | BVB |
isbn | 1787126463 9781787129511 1787129519 9781787126466 |
language | English |
oclc_num | 1014439573 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (530 pages) |
psigel | ZDB-4-EBU |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Knutson, Mick. Spring Security. 3rd ed. Birmingham : Packt Publishing, 2017. 1 online resource (530 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Print version record. Learn how to secure your Java applications from hackers using Spring Security 4.2 About This Book Architect solutions that leverage the full power of Spring Security while remaining loosely coupled. Implement various scenarios such as supporting existing user stores, user sign up, authentication, and supporting AJAX requests, Integrate with popular Microservice and Cloud services such as Zookeeper, Eureka, and Consul, along with advanced techniques, including OAuth, JSON Web Token's (JWS), Hashing, and encryption algorithms Who This Book Is For This book is intended for Java Web and/or RESTful webservice developers and assumes a basic understanding of creating Java 8, Java Web and/or RESTful webservice applications, XML, and the Spring Framework. You are not expected to have any previous experience with Spring Security. What You Will Learn Understand common security vulnerabilities and how to resolve them Learn to perform initial penetration testing to uncover common security vulnerabilities Implement authentication and authorization Learn to utilize existing corporate infrastructure such as LDAP, Active Directory, Kerberos, CAS, OpenID, and OAuth Integrate with popular frameworks such as Spring, Spring-Boot, Spring-Data, JSF, Vaaden, jQuery, and AngularJS. Gain deep understanding of the security challenges with RESTful webservices and microservice architectures Integrate Spring with other security infrastructure components like LDAP, Apache Directory server and SAML In Detail Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressured concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to easily secure your Java application with the tried and trusted Spring Security framework, a powerful and highly customizable authentication and access-control framework. The book starts by integrating a variety of authentication mechanisms. It then demonstrates how to properly restrict access to your application. It also covers tips on integrating with some of the more popular web frameworks. An example of how Spring Security defends against session fixation, moves into concurrency control, and how you can utilize session management for administrative functions is also included. It concludes with advanced security scenarios for REST ... Copyright © 2017 Packt Publishing 2017 Information technology Security measures. Computer security Management. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Technologie de l'information Sécurité Mesures. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) COMPUTERS Programming Languages Java. bisacsh COMPUTERS Security General. bisacsh COMPUTERS Enterprise Applications General. bisacsh Computer networks Security measures fast Computer security Management fast Data protection fast Information technology Security measures fast Winch, Robert. Mularien, Peter. http://id.loc.gov/authorities/names/ns2012002069 Print version: Knutson, Mick. Spring Security - Third Edition. Birmingham : Packt Publishing, ©2017 FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1641399 Volltext |
spellingShingle | Knutson, Mick Spring Security. Information technology Security measures. Computer security Management. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Technologie de l'information Sécurité Mesures. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) COMPUTERS Programming Languages Java. bisacsh COMPUTERS Security General. bisacsh COMPUTERS Enterprise Applications General. bisacsh Computer networks Security measures fast Computer security Management fast Data protection fast Information technology Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh85035859 |
title | Spring Security. |
title_auth | Spring Security. |
title_exact_search | Spring Security. |
title_full | Spring Security. |
title_fullStr | Spring Security. |
title_full_unstemmed | Spring Security. |
title_short | Spring Security. |
title_sort | spring security |
topic | Information technology Security measures. Computer security Management. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Technologie de l'information Sécurité Mesures. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) COMPUTERS Programming Languages Java. bisacsh COMPUTERS Security General. bisacsh COMPUTERS Enterprise Applications General. bisacsh Computer networks Security measures fast Computer security Management fast Data protection fast Information technology Security measures fast |
topic_facet | Information technology Security measures. Computer security Management. Computer networks Security measures. Data protection. Technologie de l'information Sécurité Mesures. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) COMPUTERS Programming Languages Java. COMPUTERS Security General. COMPUTERS Enterprise Applications General. Computer networks Security measures Computer security Management Data protection Information technology Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1641399 |
work_keys_str_mv | AT knutsonmick springsecurity AT winchrobert springsecurity AT mularienpeter springsecurity |