0

My Bag

0.00

Download App

Spring Security 3: Secure your web applications against malicious intruders with this easy to follow practical guide 19.0%OFF

Spring Security 3: Secure your web applications against malicious intruders with this easy to follow practical guide

by Peter Mularien

  • ISBN

    :  

    9789350231876

  • Publisher

    :  

    Shroff/Packt

  • Subject

    :  

    Computer Science, Information Technology: General Issues

  • Binding

    :  

    Paperback

  • Pages

    :  

    428

  • Year

    :  

    2010

650.0

19.0% OFF

526.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

Estimated Shipping Time : 5-7 Business Days

View Details

Share it on

  • Description

    Secure your web applications against malicious intruders with this easy to follow practical guide Make your web applications impenetrable. Implement authentication and authorization of users. Integrate Spring Security 3 with common external security providers. Packed full with concrete, simple, and concise examples. In Detail Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this. A comprehensive guide to Spring Security 3. You will learn through real world business scenarios how to guard against the latest threats. You will also learn to combine Spring Security 3 with external security providers such as LDAP, OpenID, CAS, Kerberos, and Active Directory. The book starts by giving an overview of security concepts and techniques, as well as setup and configuration. The book then gets you working with a JSP based web application that implements a simple e-commerce website. At this point you will progressively enhance the application giving you hands on experience implementing features of Spring Security 3 in real world business scenarios. The second half of the book is devoted to common integration scenarios that you will come accross every day. At this stage you will be in a position to solve specific, complex integration problems. The book will end by showing migration from Spring Security 2 to 3. This practical guide will show you how to implement Spring Security 3 and protect your applications from being breached using a combination of real world, straightforward examples. What you will learn from this book Recognize design flaws that will make your applications unsafe. Implement basic authorization and credential storage. Move seamlessly from Spring Security 2 to Spring Security 3. Provide Enterprise adaptability with LDAP, Active Directory, and Kerberos. Push the Boundaries of Spring Security 3 through Extension and Customization. Integrate in-house applications and popular Java frameworks with Spring Security 3. Plan the configuration of Spring Security 3 to accommodate the authentication and authorization requirements of your application. Approach The book starts by teaching the basic fundamentals of Spring Security 3 such as setup and configuration. Later it looks at more advanced topics showing the reader how to solve complex real world security issues. Who this book is written for This book is for Java developers who build web projects and applications. The book assumes basic familiarity with Java, XML and the Spring Framework. Newcomers to Spring Security will still be able to utilize all aspects of this book.

  • Author Biography

    Peter is a well-rounded Java enterprise software developer, with over ten years' experience in both product development and consulting for well-known companies across many industries. He has been an active member of the Spring community for over five years, after first discovering Spring 1.0 through self-study as part of an internal application project. Peter has been a developer in almost every major Java technology on the planet, including Java EE, JSF, Wicket, and Spring versions 1 to 3. He also instructs users through his blog, "It's Only Software". Table of Contents Preface Chapter 1: Anatomy of an Unsafe Application Chapter 2: Getting Started with Spring Security Chapter 3: Enhancing the User Experience Chapter 4: Securing Credential Storage Chapter 5: Fine-Grained Access Control Chapter 6: Advanced Configuration and Extension Chapter 7: Access Control Lists Chapter 8: Opening up to OpenID Chapter 9: LDAP Directory Services Chapter 10: Single Sign On with Central Authentication Service Chapter 11: Client Certificate Authentication Chapter 12: Spring Security Extensions Chapter 13: Migration to Spring Security 3 Appendix: Additional Reference Material Index

Related Items

-

of

  • OFFER

    FreeBSD:the Complete Refrence

    Smith

    Starts At

    521.0

    695.0

    25% OFF

  • OFFER

    Optimizing Voice in ATM/IP Mobile Networks

    Juliet Bates

    Starts At

    3948.0

    5561.0

    29% OFF

  • OFFER

    ASP.NET: Developer's Guide

    Greg Buczek

    Starts At

    877.0

    1070.0

    18% OFF

  • Modeling and Asynchronous Distributed Simulation: Analyzing Complex Systems

    Sumit Ghosh

    Starts At

    795.0

  • OFFER

    Neural Networks and Artificial Intelligence for Biomedical Engineering

    Donna L. Hudson

    Starts At

    15918.0

    18510.0

    14% OFF

  • OFFER

    Godel, Escher, Bach: An Eternal Golden Braid, 20th Anniversary Edition

    Douglas R. Hofstadter

    Starts At

    813.0

    1099.0

    26% OFF

  • Biomedical Instrumentation and Measurements

    Weibell J Fred

    Starts At

    350.0

  • OFFER

    WritingBetter Requirements

    Ian Alexander

    Starts At

    8252.0

    9596.0

    14% OFF

  • OFFER

    Designing Concurrent, Distributed, and Real-Time Applications with UML

    Hassan Gomaa

    Starts At

    6079.0

    7999.0

    24% OFF

  • OFFER

    Artificial Life V: Proceedings of the Fifth International Workshop on the Synthesis and Simulation of Living Systems (Complex Adaptive Systems)

    Christopher G. Langton

    Starts At

    6602.0

    7677.0

    14% OFF

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- Bag Empty

Your Bag is Empty!!

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : null Total Savings        : Grand Total :

Order Summary