Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro Spring Security

Buy
Pro Spring Security, 9781430248187 (1430248181), Apress, 2013

Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.

Pro Spring Security will be a reference and advanced tutorial that will do the following:

  • Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up.
  • Demonstrates the different authentication and authorization methods to secure enterprise-level applications by using the Spring Security Framework.
  • Provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications.

What you’ll learn

  • What the basics of securing a Java application, including core security concepts and the step-by-step configuration to include the Spring Security Framework in your web application
  • What tools are available in Spring security to provide login and logout capabilities, with add-ons such as remember-me and password change functionalities.
  • What are the types of authentication mechanisms tailored for enterprise-level Java applications, including LDAP, the Central Authentication Service, OpenID and X.509.
  • How to dive into each of the application layers to control user access to the different architectural elements of your Java application. You will first apply authorization control to each of the components of the Model-View-Controller tier.
  • How to work with Domain Objects and RESTful web services in our authorization queue in order to fully secure our application by using Access Control Lists, along with Object Level and Method Level authorization.
  • How to explore the powerful Grails framework and how to use Spring security in the context of a Groovy on Grails application. You will earn about the core security plugin and others such as OpenID, Facebook and Twitter authentication.

Who this book is for

This book is for Java and Grails developers who would like to secure their applications easily by applying industry’s best practices. I assume a fair knowledge of Java and a basic knowledge of Spring Dependency Injection.

Table of Contents

1. The Scope of Security
2. Introducing Spring Security
3. Spring Security Architecture and Design
4. Web Security
5. Securing the Service Layer
6. Configuring Alternative Authentication Providers
7. Business Objects Security with ACLs
8. Customizing and Extending Web Security
9. Integrating Spring Security with Other Frameworks and Languages

(HTML tags aren't allowed.)

A First Look at SQL Server 2005 for Developers
A First Look at SQL Server 2005 for Developers
Sql server 2005 contains features that constitute the biggest
change since the internal server rewrite of SQL Server 7. This is true
from both programmability and data model viewpoints. This chapter
describes SQL Server 2005 in terms of .NET programmability, SQL:1999
compliance, user-defined types (UDTs), and XML integration to
...
Super Scratch Programming Adventure!: Learn to Program By Making Cool Games
Super Scratch Programming Adventure!: Learn to Program By Making Cool Games

Scratch is the wildly popular educational programming language used by millions of first-time learners in classrooms, libraries, and homes worldwide. By dragging together colorful blocks of code, kids quickly learn computer programming concepts and make cool games and animations.

In Super Scratch Programming...

Powerhouse Marketing Plans: 14 Outstanding Real-Life Plans and What You Can Learn from Them to Supercharge Your Own Campaigns
Powerhouse Marketing Plans: 14 Outstanding Real-Life Plans and What You Can Learn from Them to Supercharge Your Own Campaigns

Without a great marketing plan, even the world’s best product will sit on the shelves. Powerhouse Marketing Plans gives you the tools you need to create a dynamic and successful campaign, showing you how to drive the sales of your products in the stratosphere using the same proven strategies of well-known companies who’ve...


Perspectives of Systems Informatics: 6th International Andrei Ershov Memorial Conference, PSI 2006, Novosibirsk, Russia, June 27-30, 2006
Perspectives of Systems Informatics: 6th International Andrei Ershov Memorial Conference, PSI 2006, Novosibirsk, Russia, June 27-30, 2006
This volume contains the final proceedings of the Sixth International Andrei Ershov Memorial Conference on Perspectives of System Informatics (PSI 2006), held in Akademgorodok (Novosibirsk, Russia), June 27-30, 2006.

The conference was held to honour the 75th anniversary of a member of the Russian Academy of Sciences Andrei Ershov
...
Clutches and Brakes: Design and Selection, Second Edition (Mechanical Engineering (Marcell Dekker))
Clutches and Brakes: Design and Selection, Second Edition (Mechanical Engineering (Marcell Dekker))
…an indispensable authoritative text by a leading expert in the field….recommended.
-Applied Mechanics Reviews, about the first edition

Written by a leading expert in the field, this reference conveniently gathering numerous formulas, analytical methods, and graphs for the design and selection of a...

Microsoft Office 2010 QuickSteps
Microsoft Office 2010 QuickSteps

Step-by-Step, Full-Color Graphics!

Start using Office 2010 right away--the QuickSteps way. Color screenshots and clear instructions make it easy to ramp up the latest release of Microsoft's powerful productivity suite. Follow along and quickly learn how to create Word documents; build Excel spreadsheets; manage Outlook email,...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy