๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Pro Spring Security_Securing Spring Framework 5 and Boot 2-based Java Applications

โœ Scribed by Carlo Scarioni, Massimo Nardone


Year
0
Tongue
English
Leaves
424
Series
2nd Edition
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.
Pro Spring Security, Second Edition has been updated to incorporate the changes in Spring Framework 5 and Spring Boot 2. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up.
This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications.
What You Will Learn

  • Explore the scope of security and how to use the Spring Security Framework
  • Master Spring security architecture and design
  • Secure the web tier in Spring
  • Work with alternative authentication providers
  • Take advantage of business objects and logic security
  • Extend Spring security with other frameworks and languages
  • Secure the service layer

Who This Book Is ForExperienced Spring and Java developers with prior experience in building Spring Framework or Boot-based applications.

โœฆ Table of Contents


Front Matter ....Pages i-xviii
The Scope of Security (Carlo Scarioni, Massimo Nardone)....Pages 1-14
Introducing Spring Security (Carlo Scarioni, Massimo Nardone)....Pages 15-34
Setting Up the Scene (Carlo Scarioni, Massimo Nardone)....Pages 35-68
Spring Security Architecture and Design (Carlo Scarioni, Massimo Nardone)....Pages 69-116
Web Security (Carlo Scarioni, Massimo Nardone)....Pages 117-158
Configuring Alternative Authentication Providers (Carlo Scarioni, Massimo Nardone)....Pages 159-219
Business Object Security with ACLs (Carlo Scarioni, Massimo Nardone)....Pages 221-277
Customizing and Extending Spring Security (Carlo Scarioni, Massimo Nardone)....Pages 279-344
Integrating Spring Security with Other Frameworks and Languages (Carlo Scarioni, Massimo Nardone)....Pages 345-399
Back Matter ....Pages 401-410


๐Ÿ“œ SIMILAR VOLUMES


Pro Spring Security: Securing Spring Fra
โœ Massimo Nardone; Carlo Scarioni ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Apress ๐ŸŒ English

Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Secur

Introducing Spring Framework 6: Learning
โœ Felipe Gutierrez, Joseph B. Ottinger ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Apress ๐ŸŒ English

<span>Spring Framework 6 remains - by far - the leading de-facto "out of the box" practical Java meta application development framework for building complex enterprise, cloud-native applications as well as web applications and microservices. </span><span>Introducing Spring Framework 6</span><span> i

Introducing Spring Framework 6: Learning
โœ Felipe Gutierrez, Joseph B. Ottinger ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Apress ๐ŸŒ English

<span>Spring Framework 6 remains - by far - the leading de-facto "out of the box" practical Java meta application development framework for building complex enterprise, cloud-native applications as well as web applications and microservices. </span><span>Introducing Spring Framework 6</span><span> i

Hands-on Spring Security 5 for Reactive
โœ John, Tomcy ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Packt Publishing ๐ŸŒ English

Secure your Java applications by integrating the Spring Security framework in your code Key Features Provide authentication, authorization and other security features for Java applications. Learn how to secure microservices, cloud, and serverless applications easily Understand the code behind the im