• Srbija
  • English
  • +381 (0)11 3463 072
  • +381 (0)60 3463 072
  • Spring Security in Action
    Spring Security in Action

    Spring Security in Action

    Laurentiu Spilca

    Spring Security in Action shows you how to prevent cross-site scripting and request forgery attacks before they do damage. You’ll start with the basics, simulating password upgrades and adding multiple types of authorization. As your skills grow, you’ll adapt Spring Security to new architectures and create advanced OAuth2 configurations. By the time you’re done, you’ll have a customized Spring Security configuration that protects against threats both common and extraordinary.

    Summary
    While creating secure applications is critically important, it can also be tedious and time-consuming to stitch together the required collection of tools. For Java developers, the powerful Spring Security framework makes it easy for you to bake security into your software from the very beginning. Filled with code samples and practical examples, Spring Security in Action teaches you how to secure your apps from the most common threats, ranging from injection attacks to lackluster monitoring. In it, you’ll learn how to manage system users, configure secure endpoints, and use OAuth2 and OpenID Connect for authentication and authorization.

    About the technology
    Security is non-negotiable. You rely on Spring applications to transmit data, verify credentials, and prevent attacks. Adopting “secure by design” principles will protect your network from data theft and unauthorized intrusions.

    About the book
    Spring Security in Action shows you how to prevent cross-site scripting and request forgery attacks before they do damage. You’ll start with the basics, simulating password upgrades and adding multiple types of authorization. As your skills grow, you’ll adapt Spring Security to new architectures and create advanced OAuth2 configurations. By the time you’re done, you’ll have a customized Spring Security configuration that protects against threats both common and extraordinary.

    What’s inside
    Encoding passwords and authenticating users
    Securing endpoints
    Automating security testing
    Setting up a standalone authorization server

    ================================================================================== Трошкове транспорта сноси купац (цена предмета + поштарина) Поштарина зависи од тежине предмета Поузећем не шаљем Не шаљем робу ван Србије Уколико дође до рекламације, повратну поштарину сноси купац Слање поштом након Ваше уплате на рачун ==================================================================================

    5.000 rsd

    Lokacija prodavca: Beograd
    Način slanja:
  • -Poštom
  • -Lično preuzimanje
  • Način plaćanja:
  • -Slanje po uplati
  • -Pouzećem
  • -Pilikom ličnog preuzimanja

  •  
    Šifra: 218795
    Prodavac: milan.flink (20)
    Ocena:
    • Pozitivne: 3
    • Negativne: 0
    • Neutralne: 0
    Prosecna ocena: 100,0%

    KorisnaKnjiga.com koristi cookije kako bi prilagodila sajt korisniku i analizirala prikazani sadžaj.
    Podaci o identitetu korisnika se ne prikupljaju, već samo informacije o posećenosti koje dalje naši partneri obrađuju. Više informacija.