Spring Security 3.1 13616

Код товару: 13616Паперова книга

This book demonstrates how to secure your Java applications from hackers using Spring Security 3.1. With plenty of handholding, it takes you step by step through every stage, accompanіed by sample code and useful screenshots.

  • Learn to leverage the power of Spring Security to keep intruders at bay through simple examples that illustrate real world problems
  • Each sample demonstrates key concepts allowing you to build your knowledge of the architecture in a practical and incremental way
  • Filled with samples that clearly illustrate how to integrate with the technologies and frameworks of your choice

In Detail

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies and other frameworks. Use this book to easily secure your Java application with the tried and trusted Spring Security framework, a powerful and highly customizable authentication and access control framework.

"Spring Security 3.1" is an incremental guide that will teach you how to protect your application from malicious users. You will learn how to cleanly integrate Spring Security into your application using the latest technologies and frameworks with the help of detailed examples.

This book is centred around a security audit of an insecure application and then modifying the sample to resolve the issues found in the audit.

starts The book by integrating a variety of authentication mechanisms. It then demonstrates how to properly restrict access to your application. It concludes with tips on integrating with some of the more popular web frameworks. An example of how Spring Security defends against session fixation, moves into concurrency control, and how you can utilize session management for administrative functions is also included.

"Spring Security 3.1" will ensure that integrating with Spring Security is seamless from start to finish.

What you will learn from this book

  • Understand common security vulnerabilities and how to resolve them
  • Implement authentication and authorization
  • Learn to utilize existing corporate infrastructure such as LDAP, Active Directory, Kerberos, and CAS
  • Integrate popular with frameworks such as Spring, JSF, GWT, Maven, and Spring Roo
  • Architect solutions that the leverage full power of Spring Security while remaining loosely coupled
  • Implement common scenarios such as supporting existing user stores, user sign up, and supporting AJAX requests

Approach

This practical step-by-step tutorial has plenty of example code coupled with the necessary screenshots and clear narration so that grasping content is made easier and quicker.

Who this book is written for

This book is intended for Java web developers and assumes a basic understanding of creating Java web applications, XML, and the Spring Framework. You are not assumed to have any previous experience with Spring Security.

About the Author

Robert Winch

Robert Winch is currently a Senior Software Engineer at VMware and is the project of lead the Spring Security framework. In the past he has worked as a Software Architect at Cerner, the largest provider of medical electronic systems in the US. Throughout his career he has developed hands on experience in integrating Spring Security with an array of security standards (i.e. LDAP, SAML, CAS, OAuth, etc). Before he was employed at Cerner, he work as an independent web contractor in proteomics research at Loyola University, Chicago, and on the Globus Toolkit at Argonne National Laboratory.

Peter Mularien

Peter Mularien is an experienced software architect and engineer, and the author of the book Spring Security 3, Packt Publishing. Peter currently works for a large financial services company and has over 12 years consulting and product experience in Java, Spring, Oracle, and many other enterprise technologies. He is also the reviewer of this book.

844 ₴
  • Нова Пошта
    Безкоштовно від 3'000,00 ₴
  • Укрпошта
    Безкоштовно від 1'000,00 ₴
  • Meest Пошта
    Безкоштовно від 3'000,00 ₴
Spring Security 3.1 - фото 1
Інші книги Packt Publishing
C Programming for Arduino
13073
Julien Bayle
850 ₴
Windows Forensics Analyst Field Guide: Engage in proactive cyber defense using digital forensics techniques
281536
Muhiballah Mohammed
1'600 ₴
Django 4 By Example: Build powerful and reliable Python web applications from scratch, 4th Edition
245903
Antonio Mele
1'100 ₴
Artificial Intelligence for Robotics - Second Edition: Build intelligent robots using ROS 2, Python, OpenCV, and AI/ML techniques for real-world tasks 2nd ed. Edition
277869
Francis X. Govers IIIDr. Kamesh Namuduri
1'800 ₴
ASP.NET Core and Angular 2
40962
Valerio De Sanctis
950 ₴
Machine Learning with PyTorch and Scikit-Learn: Develop machine learning and deep learning models with Python
259180
Yuxi (Hayden) LiuSebastian RaschkaVahid Mirjalili
1'200 ₴
Android UI Development with Jetpack Compose: Bring declarative and native UI to life quickly and easily on Android using Jetpack Compose and Kotlin 2nd ed. Edition
302588
Thomas Kunneth
1'400 ₴
Learn Java with Projects: A concise practical guide to learning everything a Java professional really needs to know 1st Edition
283683
Dr Sean KennedyMaaike Van Putten
1'800 ₴
Angular Design Patterns and Best Practices: Create scalable and adaptable applications that grow to meet evolving user needs 1st Edition
277864
Loiane GronerAlvaro Camillo NetoWilliam Grasel
1'700 ₴

Характеристики

  • Бренд
  • Автор
  • Категорія
    Комп'ютерна література
  • Рік
    2012
  • Сторінок
    456
  • Формат
    170х240 мм
  • Обкладинка
    М'яка
  • Тип паперу
    Офсетний
  • Мова
    Англійська
  • Термін поставки
    7-10 дней

Від видавця

This book demonstrates how to secure your Java applications from hackers using Spring Security 3.1. With plenty of handholding, it takes you step by step through every stage, accompanіed by sample code and useful screenshots.

  • Learn to leverage the power of Spring Security to keep intruders at bay through simple examples that illustrate real world problems
  • Each sample demonstrates key concepts allowing you to build your knowledge of the architecture in a practical and incremental way
  • Filled with samples that clearly illustrate how to integrate with the technologies and frameworks of your choice

In Detail

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies and other frameworks. Use this book to easily secure your Java application with the tried and trusted Spring Security framework, a powerful and highly customizable authentication and access control framework.

"Spring Security 3.1" is an incremental guide that will teach you how to protect your application from malicious users. You will learn how to cleanly integrate Spring Security into your application using the latest technologies and frameworks with the help of detailed examples.

This book is centred around a security audit of an insecure application and then modifying the sample to resolve the issues found in the audit.

starts The book by integrating a variety of authentication mechanisms. It then demonstrates how to properly restrict access to your application. It concludes with tips on integrating with some of the more popular web frameworks. An example of how Spring Security defends against session fixation, moves into concurrency control, and how you can utilize session management for administrative functions is also included.

"Spring Security 3.1" will ensure that integrating with Spring Security is seamless from start to finish.

What you will learn from this book

  • Understand common security vulnerabilities and how to resolve them
  • Implement authentication and authorization
  • Learn to utilize existing corporate infrastructure such as LDAP, Active Directory, Kerberos, and CAS
  • Integrate popular with frameworks such as Spring, JSF, GWT, Maven, and Spring Roo
  • Architect solutions that the leverage full power of Spring Security while remaining loosely coupled
  • Implement common scenarios such as supporting existing user stores, user sign up, and supporting AJAX requests

Approach

This practical step-by-step tutorial has plenty of example code coupled with the necessary screenshots and clear narration so that grasping content is made easier and quicker.

Who this book is written for

This book is intended for Java web developers and assumes a basic understanding of creating Java web applications, XML, and the Spring Framework. You are not assumed to have any previous experience with Spring Security.

About the Author

Robert Winch

Robert Winch is currently a Senior Software Engineer at VMware and is the project of lead the Spring Security framework. In the past he has worked as a Software Architect at Cerner, the largest provider of medical electronic systems in the US. Throughout his career he has developed hands on experience in integrating Spring Security with an array of security standards (i.e. LDAP, SAML, CAS, OAuth, etc). Before he was employed at Cerner, he work as an independent web contractor in proteomics research at Loyola University, Chicago, and on the Globus Toolkit at Argonne National Laboratory.

Peter Mularien

Peter Mularien is an experienced software architect and engineer, and the author of the book Spring Security 3, Packt Publishing. Peter currently works for a large financial services company and has over 12 years consulting and product experience in Java, Spring, Oracle, and many other enterprise technologies. He is also the reviewer of this book.

Відгуки про Spring Security 3.1

Spring Security 3.1
Spring Security 3.1
844 ₴
Персонально для вас
Metasploit, 2nd Edition
283887
Dave KennedyJim O'GormanDevon KearnsMati AharoniDr. Daniel G. Graham
2'100 ₴
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting 1st Edition
286418
Rafay Baloch
2'100 ₴
The Art of Mac Malware, Volume 2: Detecting Malicious Software
302607
Patrick Wardle
2'100 ₴
Data Engineering for Cybersecurity
303122
James Bonifield
2'100 ₴
Windows Forensics: Understand Analysis Techniques for Your Windows First Edition
306388
Chuck EasttomWilliam ButlerJessica PhelanRamya Sai BhagavatulaSean SteuberKarely RodriguezVictoria Indy BalkissoonZehra Naseer
2'200 ₴
Security in Computing, 6th Edition
286459
Pfleeger CharlesPfleeger Shari LawrenceColes-Kemp Lizzie
2'300 ₴
Practical Purple Teaming: The Art of Collaborative Defense
303120
Alfie Champion
2'300 ₴
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity
261468
Michael KoflerKlaus GebeshuberPeter KloepFrank NeugebauerAndre ZingsheimThomas HacknerMarkus WidlRoland AignerStefan KaniaTobias ScheibleMatthias Wubbeling
2'700 ₴
Cryptography: Algorithms, Protocols, and Standards for Computer Security 1st Edition
306386
Zoubir Mammeri
3'800 ₴