05724nam 2200685Ia 450 991043809680332120200520144314.09781430248194143024819X10.1007/978-1-4302-4819-4(OCoLC)845404636(MiFhGG)GVRL6VOO(CaSebORM)9781430248187(OCoLC)848884034(OCoLC)ocn848884034(CKB)2670000000387780(MiAaPQ)EBC1317476(EXLCZ)99267000000038778020130524d2013 uy 0engurun|---uuuuatxtccrPro Spring security /Carlo Scarioni ; technical reviewer, Manuel Jordan Elera1st ed. 2013.[Berkeley, CA] Apress ;New York Springerc20131 online resource (xx, 318 pages) illustrations (some color)The expert's voice in SpringIncludes index.9781430248187 1430248181 Cover; Title Page; Copyright Page; Contents at a Glance; Table of Contents; About the Author; About the Technical Reviewer; CHAPTER 1 The Scope of Security; The Network Security Layer; The Operating System Layer; The Application Layer; Authentication; Authorization; ACLs; Authentication and Authorization: General Concepts; What to Secure; More Security Concerns; Java Options for Security; Summary; CHAPTER 2 Introducing Spring Security; What Is Spring Security?; Where Does Spring Security Fit In?; Spring Security and Spring; Spring Framework: A Quick Overview; Dependency InjectionAspect Oriented Programming (AOP)An Initial Spring Security Secured Application; Adding Spring Security (and Spring Core Itself ) to the Project; Spring Security Source; Configuring the Web Project To Be Aware of Spring Security; Understanding the Simple Application; Summary; CHAPTER 3 Spring Security Architecture and Design; What Components Make Up Spring Security?; The 10,000-Foot View; The 1,000-Foot View; The 100-Foot View; The Security Interceptor; The XML Namespace; The Filters and Filter Chain; ConfigAttribute; The Authentication Object; SecurityContext and SecurityContextHolderAuthenticationProviderAccessDecisionManager; AffirmativeBased; ConsensusBased; UnanimousBased; AccessDecisionVoter; UserDetailsService and AuthenticationUserDetailsService; UserDetails; ACL; JSP Taglib; Good Design and Patterns in Spring Security; Strategy Pattern; Decorator Pattern; SRP; DI; Summary; CHAPTER 4 Web Security; Introducing the Simple Example Application; The Special URLs; Custom Login Form; Basic HTTP Authentication; Digest Authentication; Remember-Me Authentication; Allowing Remember-Me Access to Selected Parts of the Application; Logging OutThe Session (javax.servlet.http.HttpSession) and the SecurityContextBeyond Simple User Roles: Using Spring Expression Language to Secure the Web Layer; Extend with Your Own Expressions; Switching to a Different User; Session Management; Using Different Pattern Matchers for Matching Requests; Forcing the Request to HTTPS; Using the JSP Taglib; Role Hierarchies; Summary; CHAPTER 5 Securing the Service Layer; The Limitations of Web-Level Security; What Is Business Service-Level Security?; Setting Up the Example for the Chapter; How the Described Actions Happen Under the HoodCreating a Business Layer in Your Application@RolesAllowed Annotation; Securing the Application Using SpEL Expressions; Securing the Data Returned from a Method; Filtering Collections Sent and Returned from Methods; Security Defined in XML; Security Without a Web Layer; Using AspectJ AOP instead of Spring AOP; Summary; CHAPTER 6 Configuring Alternative Authentication Providers; Database-Provided Authentication; Creating the Basic Tables; Using Groups; Using Existing Schemas; LDAP Authentication; Installing and Configuring LDAPOther Attributes and Elements in the LDAP Spring Security NamespaceSecurity is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications by using the Spring Security Framework. Provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications.Expert's voice in Spring.Application softwareSecurity measuresApplication softwareDevelopmentJava (Computer program language)Web site developmentComputer networksSecurity measuresApplication softwareSecurity measures.Application softwareDevelopment.Java (Computer program language)Web site development.Computer networksSecurity measures.005.3Scarioni Carlo998907Elera Manuel Jordan1751820MiAaPQMiAaPQMiAaPQBOOK9910438096803321Pro Spring security4186931UNINA01569nam0 22003733i 450 SBL061030620251003044358.0IT8413286 20110404d1984 ||||0itac50 baitaitz01i xxxe z01nCinque anni al Parlamento europeo, 1979-1984Mauro FerriNapoliEdizioni scientifiche italiane1984165 p.21 cmDocumenti e proposteFondazione Giacomo Matteotti2001LO100557942001 Documenti e proposteFondazione Giacomo Matteotti2EuropaUnificazioneFIRCFIC003651EComunità europeeFIRCFIC014065E341.2424UNIONE EUROPEA. PARLAMENTO EUROPEO21341.7COOPERAZIONE INTERNAZIONALE19341.7COOPERAZIONE INTERNAZIONALE21Ferri, Mauro <1920-2015>RAVV0011320701354785ITIT-00000020110404IT-BN0095 IT-NA0079 IT-NA0230 IT-BN0015 NAP 01D $NAP BNMAGAZZINO magazzini correnti divisi per anniNAP IRF. CARIA $SBL0610306Biblioteca Centralizzata di Ateneo1 v. 01D (AR) 1 993 01AR 0070019935 VMA 1 v.Y 2012092720120927 01 BN IR PBCinque anni al Parlamento europeo, 1979-19843358231UNISANNIO