LEADER 03772nam 22006375 450 001 9910357836703321 005 20250609110652.0 010 $a9781484250525 010 $a1484250524 024 7 $a10.1007/978-1-4842-5052-5 035 $a(CKB)4100000009845117 035 $a(DE-He213)978-1-4842-5052-5 035 $a(MiAaPQ)EBC5983862 035 $a(CaSebORM)9781484250525 035 $a(OCoLC)1139723009 035 $a(OCoLC)on1139723009 035 $a(MiAaPQ)EBC5983808 035 $a(EXLCZ)994100000009845117 100 $a20191121d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPro Spring Security $eSecuring Spring Framework 5 and Boot 2-based Java Applications /$fby Carlo Scarioni, Massimo Nardone 205 $a2nd ed. 2019. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2019. 215 $a1 online resource (XVIII, 410 p. 148 illus.) 300 $aIncludes index. 311 08$a9781484250518 311 08$a1484250516 320 $aIncludes bibliographical references and index. 327 $a1. The Scope of Security -- 2. Introducing Spring Security -- 3. Set up the scene -- 4. Spring Security Architecture and Design -- 5. Web Security -- 6. Configuring Alternative Authentication Providers -- 7. Business Objects Security with ACLs -- 8. Customizing and Extending Spring Security -- 9. Integrating Spring Security with Other Frameworks and Languages -- Appendix A: References. 330 $aBuild and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security, Second Edition has been updated to incorporate the changes in Spring Framework 5 and Spring Boot 2. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up. This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications. You will: Explore the scope of security and how to use the Spring Security Framework Master Spring security architecture and design Secure the web tier in Spring Work with alternative authentication providers Take advantage of business objects and logic security Extend Spring security with other frameworks and languages Secure the service layer. 606 $aJava (Computer program language) 606 $aSoftware engineering 606 $aData protection 606 $aJava$3https://scigraph.springernature.com/ontologies/product-market-codes/I29070 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 615 0$aJava (Computer program language) 615 0$aSoftware engineering. 615 0$aData protection. 615 14$aJava. 615 24$aSoftware Engineering/Programming and Operating Systems. 615 24$aSecurity. 676 $a005.133 700 $aScarioni$b Carlo$4aut$4http://id.loc.gov/vocabulary/relators/aut$0998907 702 $aNardone$b Massimo$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910357836703321 996 $aPro Spring Security$92291681 997 $aUNINA