|
|
|
|
LEADER |
03473nam a2200481 4500 |
001 |
978-1-4842-5052-5 |
003 |
DE-He213 |
005 |
20191121112738.0 |
007 |
cr nn 008mamaa |
008 |
191121s2019 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781484250525
|9 978-1-4842-5052-5
|
024 |
7 |
|
|a 10.1007/978-1-4842-5052-5
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.73.J38
|
072 |
|
7 |
|a UMX
|2 bicssc
|
072 |
|
7 |
|a COM051280
|2 bisacsh
|
072 |
|
7 |
|a UMX
|2 thema
|
082 |
0 |
4 |
|a 005.133
|2 23
|
100 |
1 |
|
|a Scarioni, Carlo.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Pro Spring Security
|h [electronic resource] :
|b Securing Spring Framework 5 and Boot 2-based Java Applications /
|c by Carlo Scarioni, Massimo Nardone.
|
250 |
|
|
|a 2nd ed. 2019.
|
264 |
|
1 |
|a Berkeley, CA :
|b Apress :
|b Imprint: Apress,
|c 2019.
|
300 |
|
|
|a XVIII, 410 p. 148 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a 1. The Scope of Security -- 2. Introducing Spring Security -- 3. Set up the scene -- 4. Spring Security Architecture and Design -- 5. Web Security -- 6. Configuring Alternative Authentication Providers -- 7. Business Objects Security with ACLs -- 8. Customizing and Extending Spring Security -- 9. Integrating Spring Security with Other Frameworks and Languages -- Appendix A: References.
|
520 |
|
|
|a Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security, Second Edition has been updated to incorporate the changes in Spring Framework 5 and Spring Boot 2. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up. This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications. You will: Explore the scope of security and how to use the Spring Security Framework Master Spring security architecture and design Secure the web tier in Spring Work with alternative authentication providers Take advantage of business objects and logic security Extend Spring security with other frameworks and languages Secure the service layer.
|
650 |
|
0 |
|a Java (Computer program language).
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Data protection.
|
650 |
1 |
4 |
|a Java.
|0 http://scigraph.springernature.com/things/product-market-codes/I29070
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14002
|
650 |
2 |
4 |
|a Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28000
|
700 |
1 |
|
|a Nardone, Massimo.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484250518
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484250532
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-1-4842-5052-5
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-CWD
|
950 |
|
|
|a Professional and Applied Computing (Springer-12059)
|