Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Pro Spring securitysecuring Spring F...
~
Nardone, Massimo.
Pro Spring securitysecuring Spring Framework 5 and Boot 2-based Java applications /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Pro Spring securityby Carlo Scarioni, Massimo Nardone.
Reminder of title:
securing Spring Framework 5 and Boot 2-based Java applications /
Author:
Scarioni, Carlo.
other author:
Nardone, Massimo.
Published:
Berkeley, CA :Apress :2019.
Description:
xviii, 410 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Application softwareSecurity measures.
Online resource:
https://doi.org/10.1007/978-1-4842-5052-5
ISBN:
9781484250525$q(electronic bk.)
Pro Spring securitysecuring Spring Framework 5 and Boot 2-based Java applications /
Scarioni, Carlo.
Pro Spring security
securing Spring Framework 5 and Boot 2-based Java applications /[electronic resource] :by Carlo Scarioni, Massimo Nardone. - 2nd ed. - Berkeley, CA :Apress :2019. - xviii, 410 p. :ill., digital ;24 cm.
1. The Scope of Security -- 2. Introducing Spring Security -- 3. Set up the scene -- 4. Spring Security Architecture and Design -- 5. Web Security -- 6. Configuring Alternative Authentication Providers -- 7. Business Objects Security with ACLs -- 8. Customizing and Extending Spring Security -- 9. Integrating Spring Security with Other Frameworks and Languages -- Appendix A: References.
Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security, Second Edition has been updated to incorporate the changes in Spring Framework 5 and Spring Boot 2. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up. This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications. You will: Explore the scope of security and how to use the Spring Security Framework Master Spring security architecture and design Secure the web tier in Spring Work with alternative authentication providers Take advantage of business objects and logic security Extend Spring security with other frameworks and languages Secure the service layer.
ISBN: 9781484250525$q(electronic bk.)
Standard No.: 10.1007/978-1-4842-5052-5doiSubjects--Topical Terms:
484782
Application software
--Security measures.
LC Class. No.: QA76.76.D47 / S33 2019
Dewey Class. No.: 005.3
Pro Spring securitysecuring Spring Framework 5 and Boot 2-based Java applications /
LDR
:02589nmm a2200337 a 4500
001
569744
003
DE-He213
005
20191121112738.0
006
m d
007
cr nn 008maaau
008
200723s2019 cau s 0 eng d
020
$a
9781484250525$q(electronic bk.)
020
$a
9781484250518$q(paper)
024
7
$a
10.1007/978-1-4842-5052-5
$2
doi
035
$a
978-1-4842-5052-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.76.D47
$b
S33 2019
072
7
$a
UMX
$2
bicssc
072
7
$a
COM051280
$2
bisacsh
072
7
$a
UMX
$2
thema
082
0 4
$a
005.3
$2
23
090
$a
QA76.76.D47
$b
S285 2019
100
1
$a
Scarioni, Carlo.
$3
855868
245
1 0
$a
Pro Spring security
$h
[electronic resource] :
$b
securing Spring Framework 5 and Boot 2-based Java applications /
$c
by Carlo Scarioni, Massimo Nardone.
250
$a
2nd ed.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2019.
300
$a
xviii, 410 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
1. The Scope of Security -- 2. Introducing Spring Security -- 3. Set up the scene -- 4. Spring Security Architecture and Design -- 5. Web Security -- 6. Configuring Alternative Authentication Providers -- 7. Business Objects Security with ACLs -- 8. Customizing and Extending Spring Security -- 9. Integrating Spring Security with Other Frameworks and Languages -- Appendix A: References.
520
$a
Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security, Second Edition has been updated to incorporate the changes in Spring Framework 5 and Spring Boot 2. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up. This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications. You will: Explore the scope of security and how to use the Spring Security Framework Master Spring security architecture and design Secure the web tier in Spring Work with alternative authentication providers Take advantage of business objects and logic security Extend Spring security with other frameworks and languages Secure the service layer.
650
0
$a
Application software
$x
Security measures.
$3
484782
650
0
$a
Application software
$x
Development.
$3
189413
650
0
$a
Java (Computer program language)
$3
189341
650
0
$a
Web site development.
$3
204565
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
1 4
$a
Java.
$3
763312
650
2 4
$a
Software Engineering/Programming and Operating Systems.
$3
273711
650
2 4
$a
Security.
$3
760527
700
1
$a
Nardone, Massimo.
$3
714546
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-1-4842-5052-5
950
$a
Professional and Applied Computing (Springer-12059)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000177805
電子館藏
1圖書
電子書
EB QA76.76.D47 S285 2019 2019
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-1-4842-5052-5
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login