Spring Security in Action
Spring Security in Action
Spilca, Laurentiu
product information
Condition: New, UPC: 9781617297731, Publication Date: Sun, November 1, 2020, Type: Paperback ,
join & start selling
description
8Spring Security in Action shows you how to prevent cross-site scripting and request forgery attacks before they do damage. You'll start with the basics, simulating password upgrades and adding multiple types of authorization. As your skills grow, you'll adapt Spring Security to new architectures and create advanced OAuth2 configurations. By the time you're done, you'll have a customized Spring Security configuration that protects against threats both common and extraordinary.

Summary
While creating secure applications is critically important, it can also be tedious and time-consuming to stitch together the required collection of tools. For Java developers, the powerful Spring Security framework makes it easy for you to bake security into your software from the very beginning. Filled with code samples and practical examples, Spring Security in Action teaches you how to secure your apps from the most common threats, ranging from injection attacks to lackluster monitoring. In it, you'll learn how to manage system users, configure secure endpoints, and use OAuth2 and OpenID Connect for authentication and authorization.

Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

About the technology
Security is non-negotiable. You rely on Spring applications to transmit data, verify credentials, and prevent attacks. Adopting "secure by design" principles will protect your network from data theft and unauthorized intrusions.

About the book
Spring Security in Action shows you how to prevent cross-site scripting and request forgery attacks before they do damage. You'll start with the basics, simulating password upgrades and adding multiple types of authorization. As your skills grow, you'll adapt Spring Security to new architectures and create advanced OAuth2 configurations. By the time you're done, you'll have a customized Spring Security configuration that protects against threats both common and extraordinary.

What's inside
Encoding passwords and authenticating users
Securing endpoints
Automating security testing
Setting up a standalone authorization server

About the reader
For experienced Java and Spring developers.

About the author
Laurentiu Spilca is a dedicated development lead and trainer at Endava, with over ten years of Java experience.

Table of Contents

PART 1 - FIRST STEPS

1 Security Today

2 Hello Spring Security

PART 2 - IMPLEMENTATION

3 Managing users

4 Dealing with passwords

5 Implementing authentication

6 Hands-on: A small secured web application

7 Configuring authorization: Restricting access

8 Configuring authorization: Applying restrictions

9 Implementing filters

10 Applying CSRF protection and CORS

11 Hands-on: A separation of responsibilities

12 How does OAuth 2 work?

13 OAuth 2: Implementing the authorization server

14 OAuth 2: Implementing the resource server

15 OAuth 2: Using JWT and cryptographic signatures

16 Global method security: Pre- and postauthorizations

17 Global method security: Pre- and postfiltering

18 Hands-on: An OAuth 2 application

19 Spring Security for reactive apps

20 Spring Security testing

reviews

Be the first to write a review

member goods

No member items were found under this heading.

listens & views

ALMOST HUMAN (DIG)

by VOLTAIRE

COMPACT DISC

out of stock

$16.25

SUCH IS LIFE (UK)

by MATTHEWS,JULIE

COMPACT DISC

$13.99

WAISENHAUS-/SPATZENMESSE (GER)

by JANOWITZ/MOLL/ABBADO

COMPACT DISC

out of stock

$10.99

FIRST THE FLASH THEN THE ...

by FIREBRANDS

COMPACT DISC

out of stock

$15.75

Return Policy

All sales are final

Shipping

No special shipping considerations available.
Shipping fees determined at checkout.
promoting relevance through notable postings ]

A notem is a meaningful post that highlights an experience, idea, topic of interest, an event ... whatever a member believes worthy of discussion. Each notem becomes a pathway by which to make meaningful connections.

notems is a free, global social network that rewards members by the number and quality of notems they post.

notemote® © . Privacy Policy. Developed by Hartmann Software Group