Pro spring security securing spring framework 5 and boot 2 based java applications

Pro Spring Security: Securing Spring Framework 5 and Boot 2-Based Java Applications

Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.
Pro Spring Security, Second Edition has been updated to incorporate the changes in Spring Framework 5 and Spring Boot 2. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up.
This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications.
What You Will Learn
Explore the scope of security and how to use the Spring Security Framework
Master Spring security architecture and design
Secure the web tier in Spring
Work with alternative authentication providers
Take advantage of business objects and logic security
Extend Spring security with other frameworks and languages
Secure the service layer

Who This Book Is ForExperienced Spring and Java developers with prior experience in building Spring Framework or Boot-based applications.

Published November 22, 2019

Источник

Pro Spring Security : Securing Spring Framework 5 and Boot 2-based Java Applications

Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.
Pro Spring Security, Second Edition has been updated to incorporate the changes in Spring Framework 5 and Spring Boot 2. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up.
This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications.
What You Will LearnExplore the scope of security and how to use the Spring Security FrameworkMaster Spring security architecture and design Secure the web tier in Spring Work with alternative authentication providersTake advantage of business objects and logic securityExtend Spring security with other frameworks and languagesSecure the service layer
Who This Book Is ForExperienced Spring and Java developers with prior experience in building Spring Framework or Boot-based applications.

Читайте также:  Import class in main java

Отзывы — Написать отзыв

Избранные страницы

Содержание

Другие издания — Просмотреть все

Часто встречающиеся слова и выражения

Об авторе (2019)

Carlo Scarioni is a passionate software developer, motivated by learning and applying innovative and interesting software development tools, techniques and methodologies, his professional objectives are the following. To be in a technology-oriented enterprise where the technical staff is the soul of the company. To be in an important IT team. To be able to design and develop state of the art software. To be able to apply new knowledge every day, in innovative ways, and with a great degree of freedom. To architect, design and develop software that uses the best practices of the field. To play with the latest technologies, learn every day and participate in the research and innovation of software products. Specialties: TDD, object-oriented principles and design patterns, Java/JEE, Spring, application servers, SQL and NoSQL (MongoDB), multithreading, messaging, enterprise integration patterns, Ruby, and RoR. Certifications are Sun Certified Enterprise Architect (Part I), Sun Certified Java Programmer, Sun Certified Business Component Developer, SpringSource Certified Professional, and IBM SOA Certified Associate.
Massimo Nardone has more than 24 years of experience in security, web/mobile development, cloud, and IT architecture. His true IT passions are security and Android. He has been programming and teaching how to program with Android, Perl, PHP, Java, VB, Python, C/C++, and MySQL for more than 20 years. He holds an M.Sc. degree in computing science from the University of Salerno, Italy. During his career, he has worked as a project manager, software engineer, research engineer, chief security architect, information security manager, PCI/SCADA auditor, and senior lead IT security/cloud/SCADA architect.
His technical skills include security, Android, cloud, Java, MySQL, Drupal, Cobol, Perl, web and mobile development, MongoDB, D3, Joomla!, Couchbase, C/C++, WebGL, Python, Pro Rails, Django CMS, Jekyll, and Scratch. He has served as a visiting lecturer and supervisor for exercises at the Networking Laboratory of the Helsinki University of Technology (Aalto University). He holds four international patents (PKI, SIP, SAML, and Proxy areas). He currently works as chief information security officer (CISO) for Cargotec Oyj, and he is a member of the ISACA Finland Chapter Board. Massimo has reviewed more than 45 IT books for different publishers and has coauthored Pro JPA 2 in Java EE 8 (Apress, 2018), Beginning EJB in Java EE 8 (Apress, 2018), and Pro Android Games (Apress, 2015).

Библиографические данные

Название Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications
Авторы Carlo Scarioni , Massimo Nardone
Издатель Apress, 2019
ISBN 1484250524, 9781484250525
Количество страниц Всего страниц: 410
&nbsp &nbsp
Экспорт цитаты BiBTeX EndNote RefMan
Читайте также:  Питон поиск делителей числа через корень

Источник

Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications

Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications

Read it now on the O’Reilly learning platform with a 10-day free trial.

O’Reilly members get unlimited access to books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.

Book description

Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.

Pro Spring Security, Second Edition has been updated to incorporate the changes in Spring Framework 5 and Spring Boot 2. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up.

This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications.

  • Explore the scope of security and how to use the Spring Security Framework
  • Master Spring security architecture and design
  • Secure the web tier in Spring
  • Work with alternative authentication providers
  • Take advantage of business objects and logic security
  • Extend Spring security with other frameworks and languages
  • Secure the service layer

Experienced Spring and Java developers with prior experience in building Spring Framework or Boot-based applications.

Источник

Pro Spring Security

Book cover

This is a preview of subscription content, access via your institution.

Table of contents (9 chapters)

Front Matter

The Scope of Security

Introducing Spring Security

Setting Up the Scene

Spring Security Architecture and Design

Web Security

Configuring Alternative Authentication Providers

Business Object Security with ACLs

Customizing and Extending Spring Security

Integrating Spring Security with Other Frameworks and Languages

Back Matter

About this book

Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.


Pro Spring Security, Second Edition has been updated to incorporate the changes in Spring Framework 5 and Spring Boot 2. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up.

  • Explore the scope of security and how to use the Spring Security Framework
  • Master Spring security architecture and design
  • Secure the web tier in Spring
  • Work with alternative authentication providers
  • Take advantage of business objects and logic security
  • Extend Spring security with other frameworks and languages
  • Secure the service layer

Keywords

  • Spring Security
  • Spring Boot
  • Spring Framework
  • enterprise
  • Java
  • security
  • api
  • source
  • secure
  • develop
  • deploy
  • build
  • code

Authors and Affiliations

Surbiton, UK

HELSINKI, Finland

About the authors

Carlo Scarioni is a passionate software developer, motivated by learning and applying innovative and interesting software development tools, techniques and methodologies, his professional objectives are the following. To be in a technology-oriented enterprise where the technical staff is the soul of the company. To be in an important IT team. To be able to design and develop state of the art software. To be able to apply new knowledge every day, in innovative ways, and with a great degree of freedom. To architect, design and develop software that uses the best practices of the field. To play with the latest technologies, learn every day and participate in the research and innovation of software products. Specialties: TDD, object-oriented principles and design patterns, Java/JEE, Spring, application servers, SQL and NoSQL (MongoDB), multithreading, messaging, enterprise integration patterns, Ruby, and RoR. Certifications are Sun Certified Enterprise Architect (Part I), Sun Certified Java Programmer, Sun Certified Business Component Developer, SpringSource Certified Professional, and IBM SOA Certified Associate.

Читайте также:  Qt qml javascript function

Massimo Nardone has more than 24 years of experience in security, web/mobile development, cloud, and IT architecture. His true IT passions are security and Android. He has been programming and teaching how to program with Android, Perl, PHP, Java, VB, Python, C/C++, and MySQL for more than 20 years. He holds an M.Sc. degree in computing science from the University of Salerno, Italy. During his career, he has worked as a project manager, software engineer, research engineer, chief security architect, information security manager, PCI/SCADA auditor, and senior lead IT security/cloud/SCADA architect.

His technical skills include security, Android, cloud, Java, MySQL, Drupal, Cobol, Perl, web and mobile development, MongoDB, D3, Joomla!, Couchbase, C/C++, WebGL, Python, Pro Rails, Django CMS, Jekyll, and Scratch. He has served as a visiting lecturer and supervisor for exercises at the Networking Laboratory of the Helsinki University of Technology (Aalto University). He holds four international patents (PKI, SIP, SAML, and Proxy areas). He currently works as chief information security officer (CISO) for Cargotec Oyj, and he is a member of the ISACA Finland Chapter Board. Massimo has reviewed more than 45 IT books for different publishers and has coauthored Pro JPA 2 in Java EE 8 (Apress, 2018), Beginning EJB in Java EE 8 (Apress, 2018), and Pro Android Games (Apress, 2015).

Bibliographic Information

  • Book Title : Pro Spring Security
  • Book Subtitle : Securing Spring Framework 5 and Boot 2-based Java Applications
  • Authors : Carlo Scarioni, Massimo Nardone
  • DOI : https://doi.org/10.1007/978-1-4842-5052-5
  • Publisher : Apress Berkeley, CA
  • eBook Packages : Professional and Applied Computing , Professional and Applied Computing (R0) , Apress Access Books
  • Copyright Information : Carlo Scarioni and Massimo Nardone 2019
  • Softcover ISBN : 978-1-4842-5051-8 Published: 22 November 2019
  • eBook ISBN : 978-1-4842-5052-5 Published: 21 November 2019
  • Edition Number : 2
  • Number of Pages : XVIII, 410
  • Number of Illustrations : 148 b/w illustrations
  • Topics : Java , Software Engineering , Data and Information Security

Источник

Оцените статью