LEADER 02133nam 2200517 a 450 001 9910782534703321 005 20230721004007.0 010 $a1-281-99134-1 010 $a9786611991340 010 $a90-485-0762-6 035 $a(CKB)1000000000578958 035 $a(EBL)419757 035 $a(OCoLC)476250269 035 $a(SSID)ssj0000294024 035 $a(PQKBManifestationID)12098277 035 $a(PQKBTitleCode)TC0000294024 035 $a(PQKBWorkID)10302509 035 $a(PQKB)10307175 035 $a(MiAaPQ)EBC3327133 035 $a(EXLCZ)991000000000578958 100 $a20091013d2007 uy 0 101 0 $adut 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aDigitalisering en dynamiek$b[electronic resource] $eOver de consequenties van de digitale revolutie voor de media-industrie, in het bijzonder de uitgeverij /$fPaul Rutten 210 $aAmsterdam $cLeiden University Press$dc2007 215 $a1 online resource (31 p.) 225 0 $aLUP oraties 300 $aDescription based upon print version of record. 311 $a90-8728-015-7 320 $aIncludes bibliographical references. 330 $aInformatie en communicatietechnologie zorgen steevast voor diepgaande maatschappelijke en culturele ontwikkelingen. Dat was het geval bij de introductie van de boekdrukkunst; dat geldt ook voor de opkomst van digitale technologie. In deze oratie worden de ontwikkelingen in informatie- en communicatietechnologie in de bredere discussie over de wijze waarop technologie en samenleving zich tot elkaar verhouden geplaatst. Ondanks de oorsprong van technologische ontwikkeling in maatschappij en menselijk handelen gaat van technologie een vormende kracht op de samenleving die door diezelfde samenlevi 410 0$aLUP Oraties 606 $aDigital media 615 0$aDigital media. 676 $a025.179 700 $aRutten$b Paul$01545441 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910782534703321 996 $aDigitalisering en dynamiek$93800375 997 $aUNINA LEADER 05038nam 22006975 450 001 9910369901303321 005 20200705051644.0 010 $a9781484220504 010 $a1484220501 024 7 $a10.1007/978-1-4842-2050-4 035 $a(CKB)5280000000190233 035 $a(MiAaPQ)EBC5997319 035 $a(DE-He213)978-1-4842-2050-4 035 $a(CaSebORM)9781484220504 035 $a(PPN)242820786 035 $a(OCoLC)1154455994 035 $a(OCoLC)on1154455994 035 $a(EXLCZ)995280000000190233 100 $a20191216d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced API Security $eOAuth 2.0 and Beyond /$fby Prabath Siriwardena 205 $a2nd ed. 2020. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2020. 215 $a1 online resource (xix, 449 pages) $cillustrations 225 0 $aBooks for professionals by professionals 300 $aIncludes index. 311 08$a9781484220498 311 08$a1484220498 320 $aIncludes bibliographical references. 327 $a1. APIs Rule!.-2. Designing Security for APIs.-3. Securing APIs with Transport Layer Security (TLS).-4. OAuth 2.0 Fundamentals.-5. Edge Security with an API Gateway.-6. OpenID Connect (OIDC).-7. Message Level Security with JSON Web Signature.-8. Message Level Security with JSON Web Encryption.-9. OAuth 2.0 Profiles.-10. Accessing APIs via Native Mobile Apps.-11. OAuth 2.0 Token Binding.-12. Federating Access to APIs.-13. User Managed Access.-14. OAuth 2.0 Security -- 15. Patterns and Practices -- 16: A. The Evolution of Identity Delegation -- 17: B. OAuth 1.0 -- 18: C. How Transport Layer Security Works -- 19: D. UMA Evolution -- 20: E. Base64URL Encoding -- 21: F. Basic/Digest Authentication -- 22: G. OAuth 2.0 MAC Token Profile. 330 $aPrepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of exploitation. This book teaches you about TLS Token Binding, User Managed Access (UMA) 2.0, Cross Origin Resource Sharing (CORS), Incremental Authorization, Proof Key for Code Exchange (PKCE), and Token Exchange. Benefit from lessons learned from analyzing multiple attacks that have taken place by exploiting security vulnerabilities in various OAuth 2.0 implementations. Explore root causes, and improve your security practices to mitigate against similar future exploits. Security must be an integral part of any development project. This book shares best practices in designing APIs for rock-solid security. API security has evolved since the first edition of this book, and the growth of standards has been exponential. OAuth 2.0 is the most widely adopted framework that is used as the foundation for standards, and this book shows you how to apply OAuth 2.0 to your own situation in order to secure and protect your enterprise APIs from exploitation and attack. You will: Securely design, develop, and deploy enterprise APIs Pick security standards and protocols to match business needs Mitigate security exploits by understanding the OAuth 2.0 threat landscape Federate identities to expand business APIs beyond the corporate firewall Protect microservices at the edge by securing their APIs Develop native mobile applications to access APIs securely Integrate applications with SaaS APIs protected with OAuth 2.0. 517 3 $aAdvanced Application program interfaces security 606 $aData protection 606 $aComputers, Special purpose 606 $aComputer security 606 $aProgramming languages (Electronic computers) 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aProgramming Languages, Compilers, Interpreters$3https://scigraph.springernature.com/ontologies/product-market-codes/I14037 615 0$aData protection. 615 0$aComputers, Special purpose. 615 0$aComputer security. 615 0$aProgramming languages (Electronic computers) 615 14$aSecurity. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aSystems and Data Security. 615 24$aProgramming Languages, Compilers, Interpreters. 676 $a005.1068 700 $aSiriwardena$b Prabath$4aut$4http://id.loc.gov/vocabulary/relators/aut$0878625 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910369901303321 996 $aAdvanced API Security$91961607 997 $aUNINA