Pro Spring Security : Securing Spring Framework 5 and Boot 2-based Java Applications / / by Carlo Scarioni, Massimo Nardone
| Pro Spring Security : Securing Spring Framework 5 and Boot 2-based Java Applications / / by Carlo Scarioni, Massimo Nardone |
| Autore | Scarioni Carlo |
| Edizione | [2nd ed. 2019.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019 |
| Descrizione fisica | 1 online resource (XVIII, 410 p. 148 illus.) |
| Disciplina | 005.133 |
| Soggetto topico |
Java (Computer program language)
Software engineering Data protection Java Software Engineering/Programming and Operating Systems Security |
| ISBN |
9781484250525
1484250524 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. The Scope of Security -- 2. Introducing Spring Security -- 3. Set up the scene -- 4. Spring Security Architecture and Design -- 5. Web Security -- 6. Configuring Alternative Authentication Providers -- 7. Business Objects Security with ACLs -- 8. Customizing and Extending Spring Security -- 9. Integrating Spring Security with Other Frameworks and Languages -- Appendix A: References. |
| Record Nr. | UNINA-9910357836703321 |
Scarioni Carlo
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Pro Spring security / / Carlo Scarioni ; technical reviewer, Manuel Jordan Elera
| Pro Spring security / / Carlo Scarioni ; technical reviewer, Manuel Jordan Elera |
| Autore | Scarioni Carlo |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | [Berkeley, CA], : Apress |
| Descrizione fisica | 1 online resource (xx, 318 pages) : illustrations (some color) |
| Disciplina | 005.3 |
| Altri autori (Persone) | EleraManuel Jordan |
| Collana | The expert's voice in Spring |
| Soggetto topico |
Application software - Security measures
Application software - Development Java (Computer program language) Web site development Computer networks - Security measures |
| ISBN |
9781430248194
143024819X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright Page; Contents at a Glance; Table of Contents; About the Author; About the Technical Reviewer; CHAPTER 1 The Scope of Security; The Network Security Layer; The Operating System Layer; The Application Layer; Authentication; Authorization; ACLs; Authentication and Authorization: General Concepts; What to Secure; More Security Concerns; Java Options for Security; Summary; CHAPTER 2 Introducing Spring Security; What Is Spring Security?; Where Does Spring Security Fit In?; Spring Security and Spring; Spring Framework: A Quick Overview; Dependency Injection
Aspect Oriented Programming (AOP)An Initial Spring Security Secured Application; Adding Spring Security (and Spring Core Itself ) to the Project; Spring Security Source; Configuring the Web Project To Be Aware of Spring Security; Understanding the Simple Application; Summary; CHAPTER 3 Spring Security Architecture and Design; What Components Make Up Spring Security?; The 10,000-Foot View; The 1,000-Foot View; The 100-Foot View; The Security Interceptor; The XML Namespace; The Filters and Filter Chain; ConfigAttribute; The Authentication Object; SecurityContext and SecurityContextHolder AuthenticationProviderAccessDecisionManager; AffirmativeBased; ConsensusBased; UnanimousBased; AccessDecisionVoter; UserDetailsService and AuthenticationUserDetailsService; UserDetails; ACL; JSP Taglib; Good Design and Patterns in Spring Security; Strategy Pattern; Decorator Pattern; SRP; DI; Summary; CHAPTER 4 Web Security; Introducing the Simple Example Application; The Special URLs; Custom Login Form; Basic HTTP Authentication; Digest Authentication; Remember-Me Authentication; Allowing Remember-Me Access to Selected Parts of the Application; Logging Out The Session (javax.servlet.http.HttpSession) and the SecurityContextBeyond Simple User Roles: Using Spring Expression Language to Secure the Web Layer; Extend with Your Own Expressions; Switching to a Different User; Session Management; Using Different Pattern Matchers for Matching Requests; Forcing the Request to HTTPS; Using the JSP Taglib; Role Hierarchies; Summary; CHAPTER 5 Securing the Service Layer; The Limitations of Web-Level Security; What Is Business Service-Level Security?; Setting Up the Example for the Chapter; How the Described Actions Happen Under the Hood Creating a Business Layer in Your Application@RolesAllowed Annotation; Securing the Application Using SpEL Expressions; Securing the Data Returned from a Method; Filtering Collections Sent and Returned from Methods; Security Defined in XML; Security Without a Web Layer; Using AspectJ AOP instead of Spring AOP; Summary; CHAPTER 6 Configuring Alternative Authentication Providers; Database-Provided Authentication; Creating the Basic Tables; Using Groups; Using Existing Schemas; LDAP Authentication; Installing and Configuring LDAP Other Attributes and Elements in the LDAP Spring Security Namespace |
| Record Nr. | UNINA-9910438096803321 |
Scarioni Carlo
|
||
| [Berkeley, CA], : Apress | ||
| Lo trovi qui: Univ. Federico II | ||
| ||