Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Spring Security 3

Buy
Spring Security 3, 9781847199744 (1847199747), Packt Publishing, 2010

Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.

A comprehensive guide to Spring Security 3. You will learn through real world business scenarios how to guard against the latest threats. You will also learn to combine Spring Security 3 with external security providers such as LDAP, OpenID, CAS, Kerberos, and Active Directory.

The book starts by giving an overview of security concepts and techniques, as well as setup and configuration. The book then gets you working with a JSP based web application that implements a simple e-commerce website. At this point you will progressively enhance the application giving you hands on experience implementing features of Spring Security 3 in real world business scenarios.

The second half of the book is devoted to common integration scenarios that you will come accross every day. At this stage you will be in a position to solve specific, complex integration problems. The book will end by showing migration from Spring Security 2 to 3.

This practical guide will show you how to implement Spring Security 3 and protect your applications from being breached using a combination of real world, straightforward examples.

What you will learn from this book

  • Recognize design flaws that will make your applications unsafe.
  • Implement basic authorization and credential storage.
  • Move seamlessly from Spring Security 2 to Spring Security 3.
  • Provide Enterprise adaptability with LDAP, Active Directory, and NTLM.
  • Push the Boundaries of Spring Security 3 through Extension and Customization.
  • Integrate in-house applications and popular Java frameworks with Spring Security 3.
  • Plan the configuration of Spring Security 3 to accommodate the authentication and authorization requirements of your application.

Approach

The book starts by teaching the basic fundamentals of Spring Security 3 such as setup and configuration. Later it looks at more advanced topics showing the reader how to solve complex real world security issues.

Who this book is written for

This book is for Java developers who build web projects and applications. The book assumes basic familiarity with Java, XML and the Spring Framework. Newcomers to Spring Security will still be able to utilize all aspects of this book.

(HTML tags aren't allowed.)

Learning SciPy for Numerical and Scientific Computing Second Edition
Learning SciPy for Numerical and Scientific Computing Second Edition

Quick solutions to complex numerical problems in physics, applied mathematics, and science with SciPy

About This Book

  • Use different modules and routines from the SciPy library quickly and efficiently
  • Create vectors and matrices and learn how to perform standard mathematical operations...
CORBA Networking With Java
CORBA Networking With Java
This book is not a CORBA technical reference, but is a CORBA book for project management as the author correctly defined. And as a book for project management, this is a very good textbook. If you are a project manager, read it before your schedule delays or your presentation receives questions that you cannot answer. It's not fair to look for...
The Art of Computer Programming: Volume 3: Sorting and Searching (2nd Edition)
The Art of Computer Programming: Volume 3: Sorting and Searching (2nd Edition)

The bible of all fundamental algorithms and the work that taught many of today's software developers most of what they know about computer programming.

 

Byte, September 1995

 

...

Cryptography for Internet & Database Applications
Cryptography for Internet & Database Applications
Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest...
MATLAB Programming for Engineers
MATLAB Programming for Engineers
The first text of its kind, Stephen Chapman's best selling book on MATLAB has now been updated to reflect MATLAB 6.0. The first edition has been highly successful in engineering schools where introductory programming is taught using MATLAB rather than a traditional programming language. Although C, C++, and Java suit the needs of computer science...
Developing with Google+
Developing with Google+

Would you like to integrate Google+ with an existing website, or build your own social application on the platform? Developing with Google+ takes you on a tour of the Google+ APIs, with lots of concrete examples and hands-on projects. You’ll learn how to take advantage of Google+ social plug-ins, communicate...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy