top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Pro Spring Security : Securing Spring Framework 5 and Boot 2-based Java Applications / / by Carlo Scarioni, Massimo Nardone
Pro Spring Security : Securing Spring Framework 5 and Boot 2-based Java Applications / / by Carlo Scarioni, Massimo Nardone
Autore Scarioni Carlo
Edizione [2nd ed. 2019.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019
Descrizione fisica 1 online resource (XVIII, 410 p. 148 illus.)
Disciplina 005.133
Soggetto topico Java (Computer program language)
Software engineering
Data protection
Java
Software Engineering/Programming and Operating Systems
Security
ISBN 9781484250525
1484250524
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. The Scope of Security -- 2. Introducing Spring Security -- 3. Set up the scene -- 4. Spring Security Architecture and Design -- 5. Web Security -- 6. Configuring Alternative Authentication Providers -- 7. Business Objects Security with ACLs -- 8. Customizing and Extending Spring Security -- 9. Integrating Spring Security with Other Frameworks and Languages -- Appendix A: References.
Record Nr. UNINA-9910357836703321
Scarioni Carlo  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Pro Spring security / / Carlo Scarioni ; technical reviewer, Manuel Jordan Elera
Pro Spring security / / Carlo Scarioni ; technical reviewer, Manuel Jordan Elera
Autore Scarioni Carlo
Edizione [1st ed. 2013.]
Pubbl/distr/stampa [Berkeley, CA], : Apress
Descrizione fisica 1 online resource (xx, 318 pages) : illustrations (some color)
Disciplina 005.3
Altri autori (Persone) EleraManuel Jordan
Collana The expert's voice in Spring
Soggetto topico Application software - Security measures
Application software - Development
Java (Computer program language)
Web site development
Computer networks - Security measures
ISBN 9781430248194
143024819X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Contents at a Glance; Table of Contents; About the Author; About the Technical Reviewer; CHAPTER 1 The Scope of Security; The Network Security Layer; The Operating System Layer; The Application Layer; Authentication; Authorization; ACLs; Authentication and Authorization: General Concepts; What to Secure; More Security Concerns; Java Options for Security; Summary; CHAPTER 2 Introducing Spring Security; What Is Spring Security?; Where Does Spring Security Fit In?; Spring Security and Spring; Spring Framework: A Quick Overview; Dependency Injection
Aspect Oriented Programming (AOP)An Initial Spring Security Secured Application; Adding Spring Security (and Spring Core Itself ) to the Project; Spring Security Source; Configuring the Web Project To Be Aware of Spring Security; Understanding the Simple Application; Summary; CHAPTER 3 Spring Security Architecture and Design; What Components Make Up Spring Security?; The 10,000-Foot View; The 1,000-Foot View; The 100-Foot View; The Security Interceptor; The XML Namespace; The Filters and Filter Chain; ConfigAttribute; The Authentication Object; SecurityContext and SecurityContextHolder
AuthenticationProviderAccessDecisionManager; AffirmativeBased; ConsensusBased; UnanimousBased; AccessDecisionVoter; UserDetailsService and AuthenticationUserDetailsService; UserDetails; ACL; JSP Taglib; Good Design and Patterns in Spring Security; Strategy Pattern; Decorator Pattern; SRP; DI; Summary; CHAPTER 4 Web Security; Introducing the Simple Example Application; The Special URLs; Custom Login Form; Basic HTTP Authentication; Digest Authentication; Remember-Me Authentication; Allowing Remember-Me Access to Selected Parts of the Application; Logging Out
The Session (javax.servlet.http.HttpSession) and the SecurityContextBeyond Simple User Roles: Using Spring Expression Language to Secure the Web Layer; Extend with Your Own Expressions; Switching to a Different User; Session Management; Using Different Pattern Matchers for Matching Requests; Forcing the Request to HTTPS; Using the JSP Taglib; Role Hierarchies; Summary; CHAPTER 5 Securing the Service Layer; The Limitations of Web-Level Security; What Is Business Service-Level Security?; Setting Up the Example for the Chapter; How the Described Actions Happen Under the Hood
Creating a Business Layer in Your Application@RolesAllowed Annotation; Securing the Application Using SpEL Expressions; Securing the Data Returned from a Method; Filtering Collections Sent and Returned from Methods; Security Defined in XML; Security Without a Web Layer; Using AspectJ AOP instead of Spring AOP; Summary; CHAPTER 6 Configuring Alternative Authentication Providers; Database-Provided Authentication; Creating the Basic Tables; Using Groups; Using Existing Schemas; LDAP Authentication; Installing and Configuring LDAP
Other Attributes and Elements in the LDAP Spring Security Namespace
Record Nr. UNINA-9910438096803321
Scarioni Carlo  
[Berkeley, CA], : Apress
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui