->
Oreilly - Secure Your Spring-Based Applications - 9781787289123
Oreilly - Secure Your Spring-Based Applications
by Ankit Mishra | Released March 2017 | ISBN: 9781787289123


Secure your Java applications against hackers using Spring SecurityAbout This VideoLearn about the Spring Security architecture and designImplement Spring Security in an applicationFine-tune Spring Security and learn best practicesIn DetailKnowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. That's where Spring Security comes into the picture to simplify things for developers. A lot has changed since version 3 and with version 4.1 in place, there have been several changes and improvements to the Java Configuration, Web Application Security, Authorization, Crypto Module as well as to Testing, along with some that have been deprecated in the current release. This course is an incremental guide that will teach you how to protect your application from malicious users.You will learn how to cleanly integrate Spring Security into your application using the latest technologies and frameworks with the help of detailed examples. The scenario created in the book revolves around a security audit of an insecure application and then modifying the sample to resolve the issues found in the audit. It starts by integrating a variety of authentication mechanisms and then demonstrates how to properly restrict access to your application. It concludes with tips on integrating with some of the more popular web frameworks. An example of how Spring Security defends against session fixation moves into concurrency control, and how you can utilize session management for administrative functions, is also included. Show and hide more Publisher resources Download Example Code
  1. Chapter 1 : Introduction to Spring Security
    • The Course Overview 00:03:51
    • What Is Spring Security and Advantage? 00:08:34
    • Introducing the Latest Spring Security Version 00:11:51
    • Getting Spring Security and Core Modules 00:04:55
    • Core Components/building blocks of Spring Security 00:05:05
    • Authentication Basics 00:11:10
    • Authentication in a Web Application 00:07:51
  2. Chapter 2 : Architecture, Components, and Configuration
    • Web Security Java Configuration 00:16:07
    • HttpSecurity 00:04:40
    • Access Control in Spring Security 00:14:23
    • Form Login and CSRF 00:13:07
    • Authorize Requests 00:07:28
  3. Chapter 3 : Spring Security – Java Configuration
    • Basic and Digest Authentication 00:18:31
    • Remember-Me Authentication 00:19:43
    • Handling Logouts 00:16:25
    • Authentication Manager, Provider Manager, and Authentication Providers 00:07:15
    • Authentication Types 00:08:29
  4. Chapter 4 : Spring Security – Advance Security Part 1
    • The Security Filter Chain 00:13:57
    • Core Security Filters 00:09:32
    • Method Security 00:04:08
    • Localization 00:04:13
  5. Chapter 5 : Advance Security Part 2
    • User Detail Service Implementation 00:10:30
    • Password Encoding 00:07:04
    • HTTPResponse Headers 00:09:15
    • Session Management 00:09:02
    • Authorization Architecture 00:06:25
    • Expression Based Access Control 00:04:31
  6. Show and hide more

    Oreilly - Secure Your Spring-Based Applications


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss