| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910438096803321 |
|
|
Autore |
Scarioni Carlo |
|
|
Titolo |
Pro Spring security / / Carlo Scarioni ; technical reviewer, Manuel Jordan Elera |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
[Berkeley, CA], : Apress |
|
New York, : Springer, c2013 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2013.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xx, 318 pages) : illustrations (some color) |
|
|
|
|
|
|
Collana |
|
The expert's voice in Spring |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Application software - Security measures |
Application software - Development |
Java (Computer program language) |
Web site development |
Computer networks - Security measures |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Title Page; Copyright Page; Contents at a Glance; Table of Contents; About the Author; About the Technical Reviewer; CHAPTER 1 The Scope of Security; The Network Security Layer; The Operating System Layer; The Application Layer; Authentication; Authorization; ACLs; Authentication and Authorization: General Concepts; What to Secure; More Security Concerns; Java Options for Security; Summary; CHAPTER 2 Introducing Spring Security; What Is Spring Security?; Where Does Spring Security Fit In?; Spring Security and Spring; Spring Framework: A Quick Overview; Dependency Injection |
Aspect Oriented Programming (AOP)An Initial Spring Security Secured Application; Adding Spring Security (and Spring Core Itself ) to the Project; Spring Security Source; Configuring the Web Project To Be Aware of Spring Security; Understanding the Simple Application; Summary; CHAPTER 3 Spring Security Architecture and Design; What Components Make Up Spring Security?; The 10,000-Foot View; The 1,000-Foot View; The 100-Foot View; The Security Interceptor; The XML Namespace; The Filters and Filter Chain; ConfigAttribute; The |
|
|
|
|
|
|
|
|
|
|
|
Authentication Object; SecurityContext and SecurityContextHolder |
AuthenticationProviderAccessDecisionManager; AffirmativeBased; ConsensusBased; UnanimousBased; AccessDecisionVoter; UserDetailsService and AuthenticationUserDetailsService; UserDetails; ACL; JSP Taglib; Good Design and Patterns in Spring Security; Strategy Pattern; Decorator Pattern; SRP; DI; Summary; CHAPTER 4 Web Security; Introducing the Simple Example Application; The Special URLs; Custom Login Form; Basic HTTP Authentication; Digest Authentication; Remember-Me Authentication; Allowing Remember-Me Access to Selected Parts of the Application; Logging Out |
The Session (javax.servlet.http.HttpSession) and the SecurityContextBeyond Simple User Roles: Using Spring Expression Language to Secure the Web Layer; Extend with Your Own Expressions; Switching to a Different User; Session Management; Using Different Pattern Matchers for Matching Requests; Forcing the Request to HTTPS; Using the JSP Taglib; Role Hierarchies; Summary; CHAPTER 5 Securing the Service Layer; The Limitations of Web-Level Security; What Is Business Service-Level Security?; Setting Up the Example for the Chapter; How the Described Actions Happen Under the Hood |
Creating a Business Layer in Your Application@RolesAllowed Annotation; Securing the Application Using SpEL Expressions; Securing the Data Returned from a Method; Filtering Collections Sent and Returned from Methods; Security Defined in XML; Security Without a Web Layer; Using AspectJ AOP instead of Spring AOP; Summary; CHAPTER 6 Configuring Alternative Authentication Providers; Database-Provided Authentication; Creating the Basic Tables; Using Groups; Using Existing Schemas; LDAP Authentication; Installing and Configuring LDAP |
Other Attributes and Elements in the LDAP Spring Security Namespace |
|
|
|
|
|
|
Sommario/riassunto |
|
Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications by using the Spring Security Framework. Provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910642296003321 |
|
|
Autore |
Voss Laura <p>Ludwig-Maximilians-Universität München, Deutschland </p> |
|
|
|
|
Titolo |
|
|
|
|
More Than Machines? : The Attribution of (In)Animacy to Robot Technology / Laura Voss |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Bielefeld, : transcript Verlag, 2021 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (216 p.) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Robot |
Artificial Intelligence |
Animacy |
Anthropomorphism |
Agency |
Technology |
Society |
Science |
Sociology of Technology |
Sociology of Culture |
Sociology of Work and Industry |
Sociology |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Frontmatter -- Contents -- Acknowledgements -- Preface -- 1. Robots Wanted – Dead And/Or Alive -- 2. Disciplinary Context and Terminology -- 3. Making Robots: In/Animacy Attributions in Robotics Research and Development -- 4. Showing Off Robots: In/Animacy Attributions in Robotics Demonstrations, Science Communication, and Marketing -- 5. Reporting on Robots: In/Animacy Attributions in Media Discourse -- 6. Conclusions … and Openings -- References -- List of Figures -- List of Abbreviations -- Appendix |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
We know that robots are just machines. Why then do we often talk |
|
|
|
|
|
|
|
|
|
|
about them as if they were alive? Laura Voss explores this fascinating phenomenon, providing a rich insight into practices of animacy (and inanimacy) attribution to robot technology: from science-fiction to robotics R&D, from science communication to media discourse, and from the theoretical perspectives of STS to the cognitive sciences. Taking an interdisciplinary perspective, and backed by a wealth of empirical material, Voss shows how scientists, engineers, journalists – and everyone else – can face the challenge of robot technology appearing »a little bit alive« with a reflexive and yet pragmatic stance. |
»The full book is an accessible and quick read that I would recommend for anyone involved in journalism or media studies.« |
|
|
|
|
|
| |