|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910770265503321 |
|
|
Autore |
Nardone Massimo |
|
|
Titolo |
Pro Spring Security : Securing Spring Framework 6 and Boot 3-based Java Applications / / by Massimo Nardone, Carlo Scarioni |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[3rd ed. 2024.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (301 pages) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Java (Computer program language) |
Software engineering |
Data protection |
Java |
Software Engineering |
Data and Information Security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
1. The Scope of Security -- 2. Introducing Spring Security -- 3. Set Up the Scene -- 4. Spring Security Architecture and Design -- 5. Web Security -- 6. Configuring Alternative Authentication Providers -- 7. Business Objects Security with ACLs -- 8. Customizing and Extending Spring Security -- 9. JSON Web Token (JWT) Authentication -- Appendix A: References. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security, Third Edition has been updated to incorporate the changes in Spring Framework 6 and Spring Boot 3. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up. This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and JSON Web Token applications. What You Will Learn Explore |
|
|
|
|