Spring Security 3

Spring Security 3

English | 2010 | 420 Pages | ISBN: 1847199747 | PDF | 4,6 MB

Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.

A comprehensive guide to Spring Security 3. You will learn through real world business scenarios how to guard against the latest threats. You will also learn to combine Spring Security 3 with external security providers such as LDAP, OpenID, CAS, Kerberos, and Active Directory.

The book starts by giving an overview of security concepts and techniques, as well as setup and configuration. The book then gets you working with a JSP based web application that implements a simple e-commerce website. At this point you will progressively enhance the application giving you hands on experience implementing features of Spring Security 3 in real world business scenarios.

The second half of the book is devoted to common integration scenarios that you will come accross every day. At this stage you will be in a position to solve specific, complex integration problems. The book will end by showing migration from Spring Security 2 to 3.

This practical guide will show you how to implement Spring Security 3 and protect your applications from being breached using a combination of real world, straightforward examples.

Secure your web applications against malicious intruders with this easy to follow practical guide

Make your web applications impenetrable.
Implement authentication and authorization of users.
Integrate Spring Security 3 with common external security providers.
Packed full with concrete, simple, and concise examples.



[Fast Download] Spring Security 3

Ebooks related to "Spring Security 3" :
Cybersecurity Lexicon
Statistical Methods in Counterterrorism
SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide
Foundations and Practice of Security
The Values-based Safety Process
Managing Risk and Information Security: Protect to Enable
Learning Veeam(r) Backup and Replication for Vmware Vsphere
The Tangled Web: A Guide to Securing Modern Web Applications
Touchless Fingerprint Biometrics
Police Administration (7th Edition)
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.