LEADER 01008nam--2200373---450- 001 990002725940203316 005 20060329105505.0 010 $a88-85048-11-0 035 $a000272594 035 $aUSA01000272594 035 $a(ALEPH)000272594USA01 035 $a000272594 100 $a20060329d1981----km-y0itay0103----ba 101 $aita 102 $aIT 105 $aa|||||||001yy 200 1 $a<> servizio telefonico$erealtà e prospettive$fLudovico Amitrano 210 $aRoma$cIl cerilo$d1981 215 $a432 p.$cill.$d23 cm 225 2 $aGuide merceologiche$v10 410 0$12001$aGuide merceologiche$v10 454 1$12001 461 1$1001-------$12001 606 0 $aTelefonia 676 $a384.6 700 1$aAMITRANO,$bLudovico$0592885 801 0$aIT$bsalbc$gISBD 912 $a990002725940203316 951 $aP13 86$bDISTRA 959 $aBK 969 $aDISTRA 979 $aDISTRA2$b10$c20060329$lUSA01$h1055 996 $aServizio telefonico$91000581 997 $aUNISA LEADER 01344nam0 22003493i 450 001 VAN0263586 005 20230928084539.662 017 70$2N$a9783540393702 100 $a20230922d1985 |0itac50 ba 101 $aeng 102 $aDE 105 $a|||| ||||| 200 1 $aPerturbation of Banach Algebras$fKrzysztof Jarosz 210 $aBerlin$cSpringer$d1985 215 $avi, 122 p.$d24 cm 461 1$1001VAN0102250$12001 $aLecture notes in mathematics$1210 $aBerlin [etc.]$cSpringer$v1120 610 $aAlgebra$9KW:K 610 $aBanach$9KW:K 610 $aOperator algebras$9KW:K 610 $aOperators$9KW:K 610 $aStability$9KW:K 620 $dBerlin$3VANL000066 700 1$aJarosz$bKrzysztof$3VANV035225$056747 712 $aSpringer $3VANV108073$4650 801 $aIT$bSOL$c20240614$gRICA 856 4 $uhttps://doi.org/10.1007/BFb0076885$zE-book ? Accesso al full-text attraverso riconoscimento IP di Ateneo, proxy e/o Shibboleth 899 $aBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA$1IT-CE0120$2VAN08 912 $fN 912 $aVAN0263586 950 $aBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA$d08CONS e-book 6724 $e08eMF6724 20230929 996 $aPerturbation of Banach Algebras$93559030 997 $aUNICAMPANIA LEADER 03394nam 22006255 450 001 9910770265503321 005 20250807124835.0 010 $a9798868800351 024 7 $a10.1007/979-8-8688-0035-1 035 $a(MiAaPQ)EBC31018097 035 $a(Au-PeEL)EBL31018097 035 $a(DE-He213)979-8-8688-0035-1 035 $a(OCoLC)1415202761 035 $a(OCoLC-P)1415202761 035 $a(CaSebORM)9798868800351 035 $a(CKB)29364113700041 035 $a(OCoLC)1415897924 035 $a(Perlego)4515925 035 $a(EXLCZ)9929364113700041 100 $a20231213d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPro Spring Security $eSecuring Spring Framework 6 and Boot 3-based Java Applications /$fby Massimo Nardone, Carlo Scarioni 205 $a3rd ed. 2024. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2024. 215 $a1 online resource (301 pages) 300 $aIncludes index. 311 08$a9798868800344 327 $a1. The Scope of Security -- 2. Introducing Spring Security -- 3. Set Up the Scene -- 4. Spring Security Architecture and Design -- 5. Web Security -- 6. Configuring Alternative Authentication Providers -- 7. Business Objects Security with ACLs -- 8. Customizing and Extending Spring Security -- 9. JSON Web Token (JWT) Authentication -- Appendix A: References. 330 $aBuild and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security, Third Edition has been updated to incorporate the changes in Spring Framework 6 and Spring Boot 3. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up. This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and JSON Web Token applications. What You Will Learn Explore the scope of security and how to use the Spring Security Framework Master Spring security architecture and design Secure the web tier in Spring Work with alternative authentication providers Take advantage of business objects and logic security Extend Spring security with other frameworks and languages Secure the service layer Secure the application with JSON Web Token. 606 $aJava (Computer program language) 606 $aSoftware engineering 606 $aData protection 606 $aJava 606 $aSoftware Engineering 606 $aData and Information Security 615 0$aJava (Computer program language) 615 0$aSoftware engineering. 615 0$aData protection. 615 14$aJava. 615 24$aSoftware Engineering. 615 24$aData and Information Security. 676 $a005.133 700 $aNardone$b Massimo$0969219 701 $aScarioni$b Carlo$0998907 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910770265503321 996 $aPro Spring Security$93660382 997 $aUNINA