Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RESTful Java Web Services Security

Buy

Secure your RESTful applications against common vulnerabilities

About This Book

  • Learn how to use, configure, and set up tools for applications that use RESTful web services to prevent misuse of resources
  • Get to know and fix the most common vulnerabilities of RESTful web services APIs
  • A step-by-step guide portraying the importance of securing a RESTful web service with simple examples applied to real-world scenarios

Who This Book Is For

This book is intended for web application developers who use RESTful web services to power their websites. Prior knowledge of RESTful is not mandatory, but would be advisable.

What You Will Learn

  • Set up, implement, and personalize your development and test environment
  • Learn, understand, and assimilate concepts inherent to security management on RESTful applications and the importance of these concepts
  • Implement and test security on your applications that use RESTful web services with the most useful techniques and interpret the test results
  • Apply and configure secure protocols on your application
  • Implement, configure, and integrate other technologies such as OAuth or SSO with RESTful applications
  • Learn and assimilate security concepts at JEE application and container level
  • Understand digital signatures and message encryption through descriptive examples

In Detail

This book will serve as a practical companion for you to learn about common vulnerabilities when using RESTful services, and will provide you with an indispensable knowledge of the tools you can use to implement and test security on your applications. It will cover the fine details of setting up RESTful services such as implementing RESTEasy and securing transmission protocols such as the OAuth protocol and its integration with RESTEasy. Furthermore, it also explains the implementation of digital signatures and the integration of the Doseta framework with RESTEasy.

With this book, you will be able to design your own security implementation or use a protocol to grant permissions over your RESTful applications with OAuth. You will also gain knowledge about the working of other features such as configuring and verifying HTTP and HTTPS protocols, certificates, and securing protocols for data transmission. By the end of this book, you will have comprehensive knowledge that will help you to detect and solve vulnerabilities.

(HTML tags aren't allowed.)

Debugging Microsoft  .NET 2.0 Applications (Pro-Developer)
Debugging Microsoft .NET 2.0 Applications (Pro-Developer)
Traditionally, tools for performance tuning, testing applications, and debugging code have been expensive, hard to learn, and difficult to use. While previous versions of Microsoft Visual StudioВ® have included debuggers and other code-improvement tools, Visual Studio 2005 presents developers with robust and useful tools and processes to...
The Unusually Useful Web Book
The Unusually Useful Web Book

The Unusually Useful Web Book is the only book you need to find out everything you need to know about web sites. In fact, it's 2 books in 1. You can skim the sidebars and checklists for tips and techniques you can use right away. Or you can follow along with the main text for a detailed discussion of planning, designing, building,...

XML Demystified
XML Demystified
The fast and easy way to learn XML

Start programming in XML right away using this easy-to-follow guide. XML Demystified explains how to build XML web applications that work on any platform or browser. Step-by-step instructions with lots of examples help you learn quickly.

This one-of-a-kind...


Artificial Intelligence Applications and Innovations: 3rd IFIP Conference on Artificial Intelligence Applications and Innovations
Artificial Intelligence Applications and Innovations: 3rd IFIP Conference on Artificial Intelligence Applications and Innovations
Artificial Intelligence applications build on a rich and proven theoretical background to provide solutions to a wide range of real life problems. The ever expanding abundance of information and computing power enables researchers and users to tackle higly interesting issues for the first time, such as applications providing personalized access and...
The Algorithm Design Manual
The Algorithm Design Manual
Most of the professional programmers that I've encountered are not well prepared to tackle algorithm
design problems. This is a pity, because the techniques of algorithm design form one of the core practical
technologies of computer science. Designing correct, efficient, and implementable algorithms for realworld
problems is a tricky
...
High Density Data Storage: Principle, Technology, and Materials
High Density Data Storage: Principle, Technology, and Materials

The explosive increase in information and the miniaturization of electronic devices demand new recording technologies and materials that combine high density, fast response, long retention time and rewriting capability. As predicted, the current silicon-based computer circuits are reaching their physical limits. Further miniaturization of the...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy