LEADER 06537nam 22006495 450 001 9910369919003321 005 20251010080549.0 010 $a9783030179977 010 $a3030179974 024 7 $a10.1007/978-3-030-17997-7 035 $a(CKB)4100000008878198 035 $a(MiAaPQ)EBC5847898 035 $a(DE-He213)978-3-030-17997-7 035 $a(PPN)259451797 035 $a(Perlego)3491158 035 $a(EXLCZ)994100000008878198 100 $a20190806d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAuthoritarian Populism and Liberal Democracy /$fedited by Ivor Crewe, David Sanders 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Palgrave Macmillan,$d2020. 215 $a1 online resource (xx, 311 pages) $cillustrations 300 $aIncludes index. 311 0 $a9783030179960 311 0 $a3030179966 327 $aChapter 1. Introduction (Crewe & Sanders) -- Part 1 -- Chapter 2. Authoritarian populism and Brexit in the UK in historical perspective (Crewe) -- Chapter 3. Exploring Authoritarian Populism in Britain (Greenwood & Twyman) -- Chapter 4. Authoritarian populist opinion in Europe (Bartle, Sanders & Twyman) -- Chapter 5. Populism and Brexit (Marsh) -- Chapter 6. Populism Plus ? Voting for Donald Trump and Hillary Clinton in the 2016 US Presidential Election (Whiteley, Clarke & Stewart) -- Chapter 7. Facilitating Donald Trump: Populism, the Republican Party and Media Manipulation (McKay) -- Chapter 8. Exceptionalism, Contending Liberalisms and the Future of the Democratic Party (Wilson) -- Part 2 -- Chapter 9. How can liberal democracies respond effectively to Putin without prejudicing liberalism and democracy? (Hosking) -- Chapter 10. How can the liberal democratic cause be advanced in the Middle East? (Ezrow) -- Chapter 11. Parliamentary and presidential systems: the role of parties, and the danger of authoritarian populism (Blondel & Thiebault) -- Chapter 12. Does Populism discredit Direct Democracy? (Budge) -- Chapter 13. How should established parties respond to the rise of identity politics in their electoral base? (Kettle) -- Chapter 14. Populism and Social Citizenship: an Anglo-American comparison (Moran) -- Chapter 15. The Top Leader Fixation in British Politics (Brown) -- Chapter 16. Constitutional Reform and the Functioning of UK Democracy (Riddell) -- Part 3 -- Chapter 17. The Founding Fathers vs The People? (Weale) -- Chapter 18. Ideas, institutions, and the politicians of our governments: Anthony King as a student of liberal democracy (Allen) -- Chapter 19. Conclusion (Crewe & Sanders). 330 $a?This is a timely book on an important topic, and one in which distinguished scholars offer lucid insights that will endure for many years.? ?Professor Richard English, Queen?s University Belfast, Northern Ireland ?This is a major study of one of the greatest challenges that western democracies face today ? the rise of authoritarian populism and its threat to liberal democracy. The contributors provide profound analyses of the contemporary sources of authoritarian populism together with imaginative, and often surprising, suggestions for how democracies might respond to the challenge. It is essential reading for all of us but especially for our political elites ? who need to take notice, and act accordingly.? ?Professor Anthony Heath, Nuffield College, Oxford, UK This edited volume offers new insights into the populist wave that is affecting democratic politics in a large number of countries. The authoritarian populist turn that has developed in the US and various European countries in recent years both reflects and exacerbates the polarization of public opinion that increasingly characterizes democratic politics. The book seeks to explain how and why authoritarian populist opinion has developed and been mobilised in democratic countries. It also explores the implications of this growth in authoritarian, anti-immigrant sentiment for the operation of democratic politics in the future. It concludes that liberals may need to abandon their big-hearted internationalist instinct for open and unmanaged national borders and tacit indifference to illegal immigration. They should instead fashion a distinctively liberal position on immigration based on the socially progressive traditions of planning, public services, community cohesion and worker protection against exploitation. To do otherwise would be to provide the forces of illiberal authoritarianism with an opportunity to advance unparalleled since the 1930s and to destroy the extraordinary post-war achievements of the liberal democratic order. Ivor Crewe is Master of University College, University of Oxford, UK. He is former Professor of Government and Vice Chancellor at the University of Essex, UK, and has authored numerous publications on elections, parties and public opinion in the UK. He is co-author of The Blunders of our Governments (with A. King, 2013). David Sanders is Emeritus Professor of Political Science at the University of Essex, UK. He has authored numerous books and articles on various aspects of UK and comparative politics, including (with various co-authors) Losing an Empire, Finding a Role (1990 and 2017) and The Political Integration of Ethnic Minorities in Britain (2013). 606 $aPolitical science 606 $aEurope$xPolitics and government 606 $aAmerica$xPolitics and government 606 $aMiddle East$xPolitics and government 606 $aPolitical Science 606 $aEuropean Politics 606 $aAmerican Politics 606 $aMiddle Eastern Politics 606 $aGovernance and Government 615 0$aPolitical science. 615 0$aEurope$xPolitics and government. 615 0$aAmerica$xPolitics and government. 615 0$aMiddle East$xPolitics and government. 615 14$aPolitical Science. 615 24$aEuropean Politics. 615 24$aAmerican Politics. 615 24$aMiddle Eastern Politics. 615 24$aGovernance and Government. 676 $a320.53 676 $a320.5662 702 $aCrewe$b Ivor$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSanders$b David$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910369919003321 996 $aAuthoritarian Populism and Liberal Democracy$92511437 997 $aUNINA LEADER 05038nam 22006975 450 001 9910369901303321 005 20200705051644.0 010 $a9781484220504 010 $a1484220501 024 7 $a10.1007/978-1-4842-2050-4 035 $a(CKB)5280000000190233 035 $a(MiAaPQ)EBC5997319 035 $a(DE-He213)978-1-4842-2050-4 035 $a(CaSebORM)9781484220504 035 $a(PPN)242820786 035 $a(OCoLC)1154455994 035 $a(OCoLC)on1154455994 035 $a(EXLCZ)995280000000190233 100 $a20191216d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced API Security $eOAuth 2.0 and Beyond /$fby Prabath Siriwardena 205 $a2nd ed. 2020. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2020. 215 $a1 online resource (xix, 449 pages) $cillustrations 225 0 $aBooks for professionals by professionals 300 $aIncludes index. 311 08$a9781484220498 311 08$a1484220498 320 $aIncludes bibliographical references. 327 $a1. APIs Rule!.-2. Designing Security for APIs.-3. Securing APIs with Transport Layer Security (TLS).-4. OAuth 2.0 Fundamentals.-5. Edge Security with an API Gateway.-6. OpenID Connect (OIDC).-7. Message Level Security with JSON Web Signature.-8. Message Level Security with JSON Web Encryption.-9. OAuth 2.0 Profiles.-10. Accessing APIs via Native Mobile Apps.-11. OAuth 2.0 Token Binding.-12. Federating Access to APIs.-13. User Managed Access.-14. OAuth 2.0 Security -- 15. Patterns and Practices -- 16: A. The Evolution of Identity Delegation -- 17: B. OAuth 1.0 -- 18: C. How Transport Layer Security Works -- 19: D. UMA Evolution -- 20: E. Base64URL Encoding -- 21: F. Basic/Digest Authentication -- 22: G. OAuth 2.0 MAC Token Profile. 330 $aPrepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of exploitation. This book teaches you about TLS Token Binding, User Managed Access (UMA) 2.0, Cross Origin Resource Sharing (CORS), Incremental Authorization, Proof Key for Code Exchange (PKCE), and Token Exchange. Benefit from lessons learned from analyzing multiple attacks that have taken place by exploiting security vulnerabilities in various OAuth 2.0 implementations. Explore root causes, and improve your security practices to mitigate against similar future exploits. Security must be an integral part of any development project. This book shares best practices in designing APIs for rock-solid security. API security has evolved since the first edition of this book, and the growth of standards has been exponential. OAuth 2.0 is the most widely adopted framework that is used as the foundation for standards, and this book shows you how to apply OAuth 2.0 to your own situation in order to secure and protect your enterprise APIs from exploitation and attack. You will: Securely design, develop, and deploy enterprise APIs Pick security standards and protocols to match business needs Mitigate security exploits by understanding the OAuth 2.0 threat landscape Federate identities to expand business APIs beyond the corporate firewall Protect microservices at the edge by securing their APIs Develop native mobile applications to access APIs securely Integrate applications with SaaS APIs protected with OAuth 2.0. 517 3 $aAdvanced Application program interfaces security 606 $aData protection 606 $aComputers, Special purpose 606 $aComputer security 606 $aProgramming languages (Electronic computers) 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aProgramming Languages, Compilers, Interpreters$3https://scigraph.springernature.com/ontologies/product-market-codes/I14037 615 0$aData protection. 615 0$aComputers, Special purpose. 615 0$aComputer security. 615 0$aProgramming languages (Electronic computers) 615 14$aSecurity. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aSystems and Data Security. 615 24$aProgramming Languages, Compilers, Interpreters. 676 $a005.1068 700 $aSiriwardena$b Prabath$4aut$4http://id.loc.gov/vocabulary/relators/aut$0878625 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910369901303321 996 $aAdvanced API Security$91961607 997 $aUNINA