Spring Security, 3rd Edition

Spring Security - Third Edition 版本: Secure your web applications, RESTful services, and microservice architectures
Spring Security: Secure your web applications, RESTful services, and microservice architectures Third Edition
By 作者: Mick Knutson - Robert Winch - Peter Mularien
ISBN-10 书号: 1787129519
ISBN-13 书号: 9781787129511
Edition 版本: 3rd Revised edition
Release Finelybook 出版日期: 2017-11-28
Pages 页数: 542

The Book Description

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressured concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to easily secure your Java application with the tried and trusted Spring Security framework, a powerful and highly customizable authentication and access-control framework.
The book starts by integrating a variety of authentication mechanisms. It then demonstrates how to properly restrict access to your application. It also covers tips on integrating with some of the more popular web frameworks. An example of how Spring Security defends against session fixation, moves into concurrency control, and how you can utilize session management for administrative functions is also included.
It concludes with advanced security scenarios for RESTful webservices and microservices, detailing the issues surrounding stateless authentication, and demonstrates a concise, step-by-step approach to solving those issues. And, by the end of the book, readers can rest assured that integrating version 4.2 of Spring Security will be a seamless endeavor from start to finish.

Contents


1: ANATOMY OF AN UNSAFE APPLICATION
2: GETTING STARTED WITH SPRING SECURITY
3: CUSTOM AUTHENTICATION
4: JDBC-BASED AUTHENTICATION
5: AUTHENTICATION WITH SPRING DATA
6: LDAP DIRECTORY SERVICES
7: REMEMBER-ME SERVICES
8: CLIENT CERTIFICATE AUTHENTICATION WITH TLS
9: OPENING UP TO OAUTH 2
10: SINGLE SIGN-ON WITH THE CENTRAL AUTHENTICATION SERVICE
11: FINE-GRAINED ACCESS CONTROL
12: ACCESS CONTROL LISTS
13: CUSTOM AUTHORIZATION
14: SESSION MANAGEMENT
15: ADDITIONAL SPRING SECURITY FEATURES
16: MIGRATION TO SPRING SECURITY 4.2
17: MICROSERVICE SECURITY WITH OAUTH 2 AND JSON WEB TOKENS
18: ADDITIONAL REFERENCE MATERIAL
What You Will Learn
Understand common security vulnerabilities and how to resolve them
Learn to perform initial penetration testing to uncover common security vulnerabilities
Implement authentication and authorization
Learn to utilize existing corporate infrastructure such as LDAP, Active Directory, Kerberos, CAS, OpenID, and OAuth
Integrate with popular frameworks such as Spring, Spring-Boot, Spring-Data, JSF, Vaaden, jQuery, and AngularJS.
Gain deep understanding of the security challenges with RESTful webservices and microservice architectures
Integrate Spring with other security infrastructure components like LDAP, Apache Directory server and SAML
Authors
Mick Knutson
Mick Knutson has over 25 years of experience in the IT industry. As a passionate and experienced enterprise technology consultant, Java architect, and software developer, he looks forward to using his unique professional experience to help students learn about software development in an effective, practical, and convenient manner.
Mick's real-world expertise comes from providing individuals and mid-to-large-size businesses with advanced software consulting and training. He has collaborated with many notable clients and partners including VMware, Spring Source, FuseSource, Global Knowledge, and Knowledge United. His technical expertise includes OOA/OOD/OOP, Java, Java EE, Spring Security, Oracle, Enterprise Integration, and Message-Oriented Middleware (MOM).
As a veteran of the IT industry, Mick is determined to help as many people as possible and show that anyone can become a software developer. He has spoken around the world at training seminars, luncheons, book publishing engagements, and white paper engagements. He has authored several technical books and articles on Spring Security, Java EE 6, HTTP, and VisualVM. He is also a featured blogger at DZone, where he is part of the curated Most Valuable Blogger (MVB) group.
Having lived and breathed software development for over two decades, Mick enjoys translating complex technical concepts into plain English for different audiences. Whether he is helping an experienced software professional or someone who is new to the field, he can simplify even the most intricate IT concepts.
Mick's mission is to use his seasoned professional experience to help anyone who wants to learn about software development. As an expert and professional, Mick designs his training courses to make the learning experience as enriching, seamless, and convenient as possible so that you can master software development in the shortest amount of time.
Learn from an expert. Mick warmly looks forward to helping you learn software development in the right way so that you can maximize both your money and your time.
You can also refer to his following books:
Spring Security Third Edition
Distributed Configuration with Spring Cloud Config
Java EE6 Cookbook
HTTP Reference Card (DZone)
VisualVM Reference Card (DZone)
You can also refer to his video on BASELogic available on YouTube.
You can also connect with him on the following social media sites:
LinkedIn (mickknutson)
Twitter (mickknutson)
GitHub (mickknutson)
Bitbucket (mickknutson)
Udemy video series (MickKnutson)
Facebook (BASELogic)
Google+ (BASElogic)
Robert Winch
Robert Winch is currently a senior software engineer at VMware and is the project lead of the Spring Security framework. In the past, he has worked as a software architect at Cerner, the largest provider of electronic medical systems in the US, securing healthcare applications. Throughout his career, he has developed hands-on experience integrating Spring Security with an array of security standards (that is, LDAP, SAML, CAS, OAuth, and so on). Before he was employed at Cerner, he worked as an independent web contractor in proteomics research at Loyola University Chicago and on the Globus Toolkit at Argonne National Laboratory.
Continue reading



下载地址

Sample PDF 30-Spring Security - Third Edition 9781787129511.pdf
下载地址:【因其它原因,不再提供下载地址】 你可以 登陆 后获取帮助.

赞(0) 觉得文章有用就打赏一下文章作者
未经允许不得转载:finelybook » Spring Security, 3rd Edition
分享到: 更多 (0)

评论 抢沙发

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址

觉得文章有用就打赏一下文章作者

支付宝扫一扫打赏

微信扫一扫打赏