Spring Security - Third Edition

Nonfiction, Computers, Internet, Web Development, Java, Programming, Programming Languages
Cover of the book Spring Security - Third Edition by Mick Knutson, Robert Winch, Peter Mularien, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Mick Knutson, Robert Winch, Peter Mularien ISBN: 9781787126466
Publisher: Packt Publishing Publication: November 28, 2017
Imprint: Packt Publishing Language: English
Author: Mick Knutson, Robert Winch, Peter Mularien
ISBN: 9781787126466
Publisher: Packt Publishing
Publication: November 28, 2017
Imprint: Packt Publishing
Language: English

Learn how to secure your Java applications from hackers using Spring Security 4.2

About This Book

  • Architect solutions that leverage the full power of Spring Security while remaining loosely coupled.
  • Implement various scenarios such as supporting existing user stores, user sign up, authentication, and supporting AJAX requests,
  • Integrate with popular Microservice and Cloud services such as Zookeeper, Eureka, and Consul, along with advanced techniques, including OAuth, JSON Web Token's (JWS), Hashing, and encryption algorithms

Who This Book Is For

This book is intended for Java Web and/or RESTful webservice developers and assumes a basic understanding of creating Java 8, Java Web and/or RESTful webservice applications, XML, and the Spring Framework. You are not expected to have any previous experience with Spring Security.

What You Will Learn

  • Understand common security vulnerabilities and how to resolve them
  • Learn to perform initial penetration testing to uncover common security vulnerabilities
  • Implement authentication and authorization
  • Learn to utilize existing corporate infrastructure such as LDAP, Active Directory, Kerberos, CAS, OpenID, and OAuth
  • Integrate with popular frameworks such as Spring, Spring-Boot, Spring-Data, JSF, Vaaden, jQuery, and AngularJS.
  • Gain deep understanding of the security challenges with RESTful webservices and microservice architectures
  • Integrate Spring with other security infrastructure components like LDAP, Apache Directory server and SAML

In Detail

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressured concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to easily secure your Java application with the tried and trusted Spring Security framework, a powerful and highly customizable authentication and access-control framework.

The book starts by integrating a variety of authentication mechanisms. It then demonstrates how to properly restrict access to your application. It also covers tips on integrating with some of the more popular web frameworks. An example of how Spring Security defends against session fixation, moves into concurrency control, and how you can utilize session management for administrative functions is also included.

It concludes with advanced security scenarios for RESTful webservices and microservices, detailing the issues surrounding stateless authentication, and demonstrates a concise, step-by-step approach to solving those issues. And, by the end of the book, readers can rest assured that integrating version 4.2 of Spring Security will be a seamless endeavor from start to finish.

Style and approach

This practical step-by-step tutorial has plenty of example code coupled with the necessary screenshots and clear narration so that grasping content is made easier and quicker.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Learn how to secure your Java applications from hackers using Spring Security 4.2

About This Book

Who This Book Is For

This book is intended for Java Web and/or RESTful webservice developers and assumes a basic understanding of creating Java 8, Java Web and/or RESTful webservice applications, XML, and the Spring Framework. You are not expected to have any previous experience with Spring Security.

What You Will Learn

In Detail

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressured concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to easily secure your Java application with the tried and trusted Spring Security framework, a powerful and highly customizable authentication and access-control framework.

The book starts by integrating a variety of authentication mechanisms. It then demonstrates how to properly restrict access to your application. It also covers tips on integrating with some of the more popular web frameworks. An example of how Spring Security defends against session fixation, moves into concurrency control, and how you can utilize session management for administrative functions is also included.

It concludes with advanced security scenarios for RESTful webservices and microservices, detailing the issues surrounding stateless authentication, and demonstrates a concise, step-by-step approach to solving those issues. And, by the end of the book, readers can rest assured that integrating version 4.2 of Spring Security will be a seamless endeavor from start to finish.

Style and approach

This practical step-by-step tutorial has plenty of example code coupled with the necessary screenshots and clear narration so that grasping content is made easier and quicker.

More books from Packt Publishing

Cover of the book Mastering SaltStack - Second Edition by Mick Knutson, Robert Winch, Peter Mularien
Cover of the book Magento Search Engine Optimization by Mick Knutson, Robert Winch, Peter Mularien
Cover of the book Puppet 5 Cookbook by Mick Knutson, Robert Winch, Peter Mularien
Cover of the book C++ Data Structures and Algorithms by Mick Knutson, Robert Winch, Peter Mularien
Cover of the book SQL Server 2017 Developer’s Guide by Mick Knutson, Robert Winch, Peter Mularien
Cover of the book Getting Started with ownCloud by Mick Knutson, Robert Winch, Peter Mularien
Cover of the book Hyper-V Network Virtualization Cookbook by Mick Knutson, Robert Winch, Peter Mularien
Cover of the book Kali Linux - An Ethical Hacker's Cookbook by Mick Knutson, Robert Winch, Peter Mularien
Cover of the book Creating Stunning Dashboards with QlikView by Mick Knutson, Robert Winch, Peter Mularien
Cover of the book Nagios Core Administration Cookbook - Second Edition by Mick Knutson, Robert Winch, Peter Mularien
Cover of the book Essential Meeting Blueprints for Managers by Mick Knutson, Robert Winch, Peter Mularien
Cover of the book SSL VPN : Understanding, evaluating and planning secure, web-based remote access by Mick Knutson, Robert Winch, Peter Mularien
Cover of the book Windows Server 2016 Administration Fundamentals by Mick Knutson, Robert Winch, Peter Mularien
Cover of the book PHP and script.aculo.us Web 2.0 Application Interfaces by Mick Knutson, Robert Winch, Peter Mularien
Cover of the book Advertising on Google: The High Performance Cookbook by Mick Knutson, Robert Winch, Peter Mularien
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy