Spring Security 3

Nonfiction, Computers, Advanced Computing, Information Technology
Cover of the book Spring Security 3 by Peter Mularien, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Peter Mularien ISBN: 9781847199751
Publisher: Packt Publishing Publication: March 1, 2006
Imprint: Packt Publishing Language: English
Author: Peter Mularien
ISBN: 9781847199751
Publisher: Packt Publishing
Publication: March 1, 2006
Imprint: Packt Publishing
Language: English

Secure your web applications against malicious intruders with this easy to follow practical guide

About This Book

  • Make your web applications impenetrable.
  • Implement authentication and authorization of users.
  • Integrate Spring Security 3 with common external security providers.
  • Packed full with concrete, simple, and concise examples.

Who this book is for

This book is for Java developers who build web projects and applications. The book assumes basic familiarity with Java, XML and the Spring Framework. Newcomers to Spring Security will still be able to utilize all aspects of this book.

What You Will Learn

  • Recognize design flaws that will make your applications unsafe.
  • Implement basic authorization and credential storage.
  • Move seamlessly from Spring Security 2 to Spring Security 3.
  • Provide Enterprise adaptability with LDAP, Active Directory, and NTLM.
  • Push the Boundaries of Spring Security 3 through Extension and Customization.
  • Integrate in-house applications and popular Java frameworks with Spring Security 3.
  • Plan the configuration of Spring Security 3 to accommodate the authentication and authorization requirements of your application.

In Detail

Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.

A comprehensive guide to Spring Security 3. You will learn through real world business scenarios how to guard against the latest threats. You will also learn to combine Spring Security 3 with external security providers such as LDAP, OpenID, CAS, Kerberos, and Active Directory.

The book starts by giving an overview of security concepts and techniques, as well as setup and configuration. The book then gets you working with a JSP based web application that implements a simple e-commerce website. At this point you will progressively enhance the application giving you hands on experience implementing features of Spring Security 3 in real world business scenarios.

The second half of the book is devoted to common integration scenarios that you will come accross every day. At this stage you will be in a position to solve specific, complex integration problems. The book will end by showing migration from Spring Security 2 to 3.

Style and approach

The book starts by teaching the basic fundamentals of Spring Security 3 such as setup and configuration. Later it looks at more advanced topics showing the reader how to solve complex real world security issues.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Secure your web applications against malicious intruders with this easy to follow practical guide

About This Book

Who this book is for

This book is for Java developers who build web projects and applications. The book assumes basic familiarity with Java, XML and the Spring Framework. Newcomers to Spring Security will still be able to utilize all aspects of this book.

What You Will Learn

In Detail

Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.

A comprehensive guide to Spring Security 3. You will learn through real world business scenarios how to guard against the latest threats. You will also learn to combine Spring Security 3 with external security providers such as LDAP, OpenID, CAS, Kerberos, and Active Directory.

The book starts by giving an overview of security concepts and techniques, as well as setup and configuration. The book then gets you working with a JSP based web application that implements a simple e-commerce website. At this point you will progressively enhance the application giving you hands on experience implementing features of Spring Security 3 in real world business scenarios.

The second half of the book is devoted to common integration scenarios that you will come accross every day. At this stage you will be in a position to solve specific, complex integration problems. The book will end by showing migration from Spring Security 2 to 3.

Style and approach

The book starts by teaching the basic fundamentals of Spring Security 3 such as setup and configuration. Later it looks at more advanced topics showing the reader how to solve complex real world security issues.

More books from Packt Publishing

Cover of the book Python: Penetration Testing for Developers by Peter Mularien
Cover of the book Mastering Kali Linux for Advanced Penetration Testing by Peter Mularien
Cover of the book Hands-On Reactive Programming in Spring 5 by Peter Mularien
Cover of the book Citrix® XenApp® 7.x Performance Essentials by Peter Mularien
Cover of the book QGIS 2 Cookbook by Peter Mularien
Cover of the book Deployment with Docker by Peter Mularien
Cover of the book Docker on Amazon Web Services by Peter Mularien
Cover of the book Liferay Beginners Guide by Peter Mularien
Cover of the book Microsoft Application Virtualization Cookbook by Peter Mularien
Cover of the book Nginx HTTP Server by Peter Mularien
Cover of the book Refactoring with Microsoft Visual Studio 2010 by Peter Mularien
Cover of the book Network Vulnerability Assessment by Peter Mularien
Cover of the book Learning SciPy for Numerical and Scientific Computing - Second Edition by Peter Mularien
Cover of the book Mastering Unity 5.x by Peter Mularien
Cover of the book Fast Data Processing with Spark by Peter Mularien
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy