Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Spring Security 3.x Cookbook

Buy
Spring Security 3.x Cookbook, 9781782167525 (1782167528), Packt Publishing, 2013

Secure your Java applications against online threats by learning the powerful mechanisms of Spring Security. Presented as a cookbook full of recipes, this book covers a wide range of vulnerabilities and scenarios.

Overview

  • Learn about all the mandatory security measures for modern day applications using Spring Security
  • Investigate different approaches to application level authentication and authorization
  • Master how to mount security on applications used by developers and organizations

In Detail

Web applications are exposed to a variety of threats and vulnerabilities at the authentication, authorization, service, and domain object levels. Spring Security can help secure these applications against those threats.

Spring Security is a popular application security solution for Java applications. It is widely used to secure standalone web applications, portlets, and increasingly REST applications. It is a powerful and highly customizable authentication and access-control framework. It is the de-facto standard for securing Spring-based applications and it is currently used to secure numerous demanding environments including government agencies, military applications, and central banks.

"Spring Security 3.x Cookbook" is a repository of recipes to help you successfully secure web applications against threats and vulnerabilities at the authentication and session level layers using the Spring Security framework. We will not only explore Spring-based web applications, but also Java-based and Grails-based applications that can use Spring Security as their security framework. Apart from conventional web applications, we will also look at securing portlets, RESTful web service applications, and other non-web applications.

This book will also take you through how to integrate Spring Security with other popular web frameworks/technologies such as Vaadin, EJB, and GWT. In addition to testing and debugging the implemented security measures, this book will also delve into finer aspects of Spring Security implementation such as how it deals with concurrency, multitenancy, and customization, and we will even show you how to disable it.

This book gives you an overview of Spring Security and its implementation with various frameworks. It starts with container-based authentication before taking you on a tour of the main features of Spring Security. It demonstrates security concepts like BASIC, FORM, and DIGEST authentication and shows you how to integrate the Spring Security framework with various frameworks like JSF, struts2, Vaadin, and more.

The book also demonstrates how to utilize container managed security without JAAS. Then, we move on to setting up a struts2 application before showing you how to integrate Spring Security with other frameworks like JSF, Groovy, Wicket, GWT, and Vaadin respectively.

This book will serve as a highly practical guide and will give you confidence when it comes to applying security to your applications. It's packed with simple examples which show off each concept of Spring Security and which help you learn how it can be integrated with various frameworks.

What you will learn from this book

  • Implement Form-based, HTTP Basic, Client, and Digest authentications
  • Bring in Groovy on Grails with Form-based Spring Security
  • Integrate Spring Security with Vaadin
  • Combine Spring Security with ORM and NoSQLDB
  • Use Spring Security in Spring-Social (Facebook and Twitter)
  • Learn about Spring Security for SOAP
  • Authenticate RESTful services with Spring Security
(HTML tags aren't allowed.)

Photoshop Elements 2 Most Wanted
Photoshop Elements 2 Most Wanted

All the most common and popular uses of Adobe Photoshop Elements 2 have been brought together in one volume. Each section provides a useful guide to techniques, a summary of the tools used and several step-by-step projects to clearly demonstrate each effect. There's also a wealth of tips and tricks to help you get the most out of this...

Interactive Collaborative Information Systems (Studies in Computational Intelligence)
Interactive Collaborative Information Systems (Studies in Computational Intelligence)

The increasing complexity of our world demands new perspectives on the role of technology in human decision making. We need new technology to cope with the increasingly complex and information-rich nature of our modern society. This is particularly true for critical environments such as crisis management and traffic management, where humans...

DVD Authoring and Production
DVD Authoring and Production
SPECIAL FEATURE: A copy of the author's own DVD title, StarGaze, is included to provide real-world examples of each DVD authoring and production process. This book takes up where DVD Demystified leaves off, explaining the vital details of designing, producing, and selling a DVD. Don't make a disc without it. - Jim Taylor, Chief of DVD...

Word-Formation in English (Cambridge Textbooks in Linguistics)
Word-Formation in English (Cambridge Textbooks in Linguistics)
Providing an accessible introduction to the study of word-formation, this text focuses specifically on English. Assuming no prior linguistic knowledge, Ingo Plag explains the fundamentals of word-formation, demonstrating how morphemes--the elements of a word's internal structure--can function to relate words to other words, and to create new words....
Inside Delphi 2006 (Wordware Delphi Developer's Library)
Inside Delphi 2006 (Wordware Delphi Developer's Library)

Now in its 10th version, Delphi provides users with four programming languages: C++ and Delphi for Win32 for building Windows applications, and C# and Delphi for .NET for building applications that target the .NET platform. Inside Delphi 2006 demonstrates how to use all of these languages. Topics include the foundations of Delphi, VCL...

Information Theory and Reliable Communication
Information Theory and Reliable Communication
This book is designed primarily for use as a first-year graduate text in information theory, suitable for both engineers and mathematicians. It is assumed that the reader has some understanding of freshman calculus and elementary probability, and in the later chapters some introductory random process theory. Unfortunately there is one more...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy