Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RESTful Java Web Services Security

Buy

Secure your RESTful applications against common vulnerabilities

About This Book

  • Learn how to use, configure, and set up tools for applications that use RESTful web services to prevent misuse of resources
  • Get to know and fix the most common vulnerabilities of RESTful web services APIs
  • A step-by-step guide portraying the importance of securing a RESTful web service with simple examples applied to real-world scenarios

Who This Book Is For

This book is intended for web application developers who use RESTful web services to power their websites. Prior knowledge of RESTful is not mandatory, but would be advisable.

What You Will Learn

  • Set up, implement, and personalize your development and test environment
  • Learn, understand, and assimilate concepts inherent to security management on RESTful applications and the importance of these concepts
  • Implement and test security on your applications that use RESTful web services with the most useful techniques and interpret the test results
  • Apply and configure secure protocols on your application
  • Implement, configure, and integrate other technologies such as OAuth or SSO with RESTful applications
  • Learn and assimilate security concepts at JEE application and container level
  • Understand digital signatures and message encryption through descriptive examples

In Detail

This book will serve as a practical companion for you to learn about common vulnerabilities when using RESTful services, and will provide you with an indispensable knowledge of the tools you can use to implement and test security on your applications. It will cover the fine details of setting up RESTful services such as implementing RESTEasy and securing transmission protocols such as the OAuth protocol and its integration with RESTEasy. Furthermore, it also explains the implementation of digital signatures and the integration of the Doseta framework with RESTEasy.

With this book, you will be able to design your own security implementation or use a protocol to grant permissions over your RESTful applications with OAuth. You will also gain knowledge about the working of other features such as configuring and verifying HTTP and HTTPS protocols, certificates, and securing protocols for data transmission. By the end of this book, you will have comprehensive knowledge that will help you to detect and solve vulnerabilities.

(HTML tags aren't allowed.)

Introducing AutoCAD 2008
Introducing AutoCAD 2008

Quickly Master AutoCAD 2008 Essentials

This practical guide helps users of all skill levels learn the basics of AutoCAD 2008 and AutoCAD LT 2008 easily and efficiently. In this fresh new take on the popular Just Enough AutoCAD, bestselling AutoCAD author and expert George Omura offers clear explanations, a task-based approach,...

The Genre of Acts and Collected Biography (Society for New Testament Studies Monograph Series)
The Genre of Acts and Collected Biography (Society for New Testament Studies Monograph Series)

It is widely accepted by New Testament scholars that the Gospel of Luke and the Acts of the Apostles probably originated as two parts of one work by a single author. In spite of this, the books have been assigned to very different genres: Luke is traditionally viewed as a biography of Jesus, and Acts as a history of the early church....

Modeling and Optimization of Interdependent Energy Infrastructures
Modeling and Optimization of Interdependent Energy Infrastructures

This book opens up new ways to develop mathematical models and optimization methods for interdependent energy infrastructures, ranging from the electricity network, natural gas network, district heating network, and electrified transportation network. The authors provide methods to help analyze, design, and operate the integrated...


The Career Portfolio Workbook
The Career Portfolio Workbook

Your resume may have gotten you the interview, but a career portfolio will get you the job

Employers are interested in actions, not words. And a career portfolio shows them that you have the skills, talent, knowledge, and personality they want. With The Career Portfolio Workbook learn...

Microsoft Word Version 2002 Inside Out
Microsoft Word Version 2002 Inside Out

Welcome to Word 2002—the fast-moving, streamlined, full-featured new edition of one of the world's most popular word processing programs. Are you looking for a way to create professional documents faster and better than ever? Word can help you with that. Would your life be easier if you had a program capable of a powerful but...

Big Change at Best Buy: Working Through Hypergrowth to Sustained Excellence
Big Change at Best Buy: Working Through Hypergrowth to Sustained Excellence

Designed to redefine successful change management in corporate America, Big Change at Best Buy offers hard-won lessons and the tools every executive and manager needs—in every business and every industry—to turn management practices and culture focused on rapid growth into the type of disciplined, customer-centered operation...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy