Pro Spring Security: Securing Spring Framework 6 and Boot 3-based Java Applications
Author: Massimo Nardone (Author), Carlo Scarioni (Author)
Publisher finelybook 出版社: Apress
Edition 版本: 3rd ed.
Publication Date 出版日期: 2023-12-14
Language 语言: English
Print Length 页数: 307 pages
ISBN-13: 9798868800344
Book Description
Pro Spring Security, Third Edition has been updated to incorporate the changes in Spring Framework 6 and Spring Boot 3. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up.
This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and JSON Web Token applications.
What You Will Learn
- Explore the scope of security and how to use the Spring Security Framework
- Master Spring security architecture and design
- Secure the web tier in Spring
- Work with alternative authentication providers
- Take advantage of business objects and logic security
- Extend Spring security with other frameworks and languages
- Secure the service layer
- Secure the application with JSON Web Token
Who This Book Is For
Experienced Spring and Java developers with prior experience in building Spring Framework or Boot-based applications
From the Back Cover
Pro Spring Security, Third Edition has been updated to incorporate the changes in Spring Framework 6 and Spring Boot 3. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up.
This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and JSON Web Token applications.
What You Will Learn
- Explore the scope of security and how to use the Spring Security Framework
- Master Spring security architecture and design
- Secure the web tier in Spring
- Work with alternative authentication providers
- Take advantage of business objects and logic security
- Extend Spring security with other frameworks and languages
- Secure the service layer
- Secure the application with JSON Web Token
About the Author
In his last working engagement, he worked as a seasoned Cyber and Information Security Executive, CISO and OT, IoT and IIoT Security competence Leader helping many clients to develop and implement Cyber, Information, OT, IoT Security activities.
His technical skills include Security, OT/IoT/IIoT, Android, Cloud, Java, MySQL, Drupal, Cobol, Perl, web and mobile development, MongoDB, D3, Joomla!, Couchbase, C/C++, WebGL, Python, Pro Rails, Django CMS, Jekyll, and Scratch. He has served as a visiting lecturer and supervisor for exercises at the Networking Laboratory of the Helsinki University of Technology (Aalto University).
He stays current to industry and security trends, attending events, being part of a board such as the ISACA Finland Chapter Board, ISF, Nordic CISO Forum, Android Global Forum, etc.
He holds four international patents (PKI, SIP, SAML, and Proxy areas). He currently works as a Cyber Security Freelancer for IT/OT and IoT. He has reviewed more than 55 IT books for different publishers and has coauthored Pro JPA 2 in Java EE 8 (Apress, 2018), Beginning EJB in Java EE 8 (Apress, 2018), and Pro Android Games (Apress, 2015).
Carlo Scarioni is a passionate software developer, motivated by learning and applying innovative and interesting software development tools, techniques, and methodologies. He has worked for more than 18 years in the field and moved across multiple languages, paradigms, and subject areas. He also has many years of experience working with Java and its ecosystem. He has been in love with Spring since the beginning and he is fascinated by how Spring allows building complex applications out of discrete, focused modules and by the clever use of decorators to add cross-cutting functionalities. In the last few years he has been working mostly with data engineering solutions. He has been creating solutions around the use of modern data stack components in cloud environments, while at the same time developing software using technologies such as Spark, Python, and others.