Зарегистрироваться
Восстановить пароль
FAQ по входу

Spilca Laurentiu. Spring Security in Action

  • Файл формата zip
  • размером 6,33 МБ
  • содержит документ формата epub
Spilca Laurentiu. Spring Security in Action
2nd Edition. — Manning Publications, 2024. — 436 p. — ISBN-13: 978-1633437975.
Design and develop Spring applications that are secure right from the start.
In Spring Security in Action, Second Edition you will learn essential security skills including how to:
Implement and customize authentication and authorization.
Set up all components of an OAuth 2/OpenID Connect system.
Utilize CRSF and CORS configurations.
Secure Spring reactive applications.
Write tests for security configurations.
Spring Security in Action, Second Edition is a revised version of the bestselling original, fully updated for Spring Boot 3 and Oauth2/OpenID Connect. This new edition covers the latest patterns for application-level security in Spring apps, demonstrating how Spring Security simplifies every step of the security process. Code samples and useful real-world examples give you hands-on experience of protecting your apps from common threats such as injection attacks and poor monitoring.
About the technology
Spring Security is essential for any Java developer looking to master authentication and authorization in Spring apps. By adopting "secure by design" principles with Spring Security's out-of-the-box features, you can protect your apps from data theft and unauthorized intrusions.
About the book
Spring Security in Action, Second Edition reveals the Spring Security techniques and tools you need to defend your apps against attack. In this book, author Laurentiu Spilca, a skilled Java and Spring developer, will teach you how to build your own authorization server, manage system users, configure secure endpoints, and prevent cross-site scripting and request forgery attacks. This new second edition delves into the OAuth 2/OpenID Connect stack and details SecurityFilterChain for security configuration. Don't let security be an afterthought. Start protecting your apps from the first line of code!
About the reader
For experienced Java and Spring developers.
Table of Contents
Part 1
Security today
Hello, Spring Security
Part 2
Managing users
Managing passwords
A web app’s security begins with filters
Implementing authentications
Part 3
Configuring endpoint-level authorization: Restricting access
Configuring endpoint-level authorization: Applying restrictions
Configuring CSRF protection
Configuring CORS
Implementing authorization at the method level
Implementing filtering at the method level
Part 4
What are OAuth 2 and OpenID Connect?
Implementing an OAuth 2 authorization server
Implementing an OAuth 2 resource server
Implementing an OAuth 2 client
Part 5
Implementing security in reactive applications
Part 6
Testing security configurations
  • Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.
  • Регистрация