HOME > Detail View

Detail View

Hands-on Spring security 5 for reactive applications [electronic resource] : learn effective ways to secure your applications with Spring and Spring WebFlux

Hands-on Spring security 5 for reactive applications [electronic resource] : learn effective ways to secure your applications with Spring and Spring WebFlux

Material type
E-Book(소장)
Personal Author
John, Tomcy.
Title Statement
Hands-on Spring security 5 for reactive applications [electronic resource] : learn effective ways to secure your applications with Spring and Spring WebFlux / Tomcy John.
Publication, Distribution, etc
Birmingham, UK :   Packt Publishing,   2018.  
Physical Medium
1 online resource (vii, 248 p.) : ill.
ISBN
9781788990073 (electronic bk.) 1788990072 (electronic bk.) 9781788995979
General Note
Title from e-Book title page.  
Includes index.  
이용가능한 다른형태자료
Issued also as a book.  
Subject Added Entry-Topical Term
Web applications --Security measures. Application software --Development. Computer security.
Short cut
EBSCOhost   URL
000 00000cam u2200205 a 4500
001 000045985026
005 20190530174132
006 m d
007 cr
008 190529s2018 enka o 001 0 eng d
020 ▼a 9781788990073 (electronic bk.)
020 ▼a 1788990072 (electronic bk.)
020 ▼a 9781788995979
035 ▼a 1862356 ▼b (N$T)
035 ▼a (OCoLC)1050169819
037 ▼a CL0500000988 ▼b Safari Books Online
037 ▼a 79595C3D-8350-4600-875E-29293D4CE5BC ▼b OverDrive, Inc. ▼n http://www.overdrive.com
040 ▼a UMI ▼b eng ▼e rda ▼e pn ▼c UMI ▼d TEFOD ▼d N$T ▼d 211009
050 4 ▼a QA76.76.A65
082 0 4 ▼a 005.25 ▼2 23
084 ▼a 005.25 ▼2 DDCK
090 ▼a 005.25
100 1 ▼a John, Tomcy.
245 1 0 ▼a Hands-on Spring security 5 for reactive applications ▼h [electronic resource] : ▼b learn effective ways to secure your applications with Spring and Spring WebFlux / ▼c Tomcy John.
246 3 ▼a Hands-on Spring security five for reactive applications
260 ▼a Birmingham, UK : ▼b Packt Publishing, ▼c 2018.
300 ▼a 1 online resource (vii, 248 p.) : ▼b ill.
500 ▼a Title from e-Book title page.
500 ▼a Includes index.
530 ▼a Issued also as a book.
538 ▼a Mode of access: World Wide Web.
630 0 0 ▼a Spring (Software framework).
650 0 ▼a Web applications ▼x Security measures.
650 0 ▼a Application software ▼x Development.
650 0 ▼a Computer security.
856 4 0 ▼3 EBSCOhost ▼u https://oca.korea.ac.kr/link.n2s?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1862356
945 ▼a KLPA
991 ▼a E-Book(소장)

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Main Library/e-Book Collection/ Call Number CR 005.25 Accession No. E14012797 Availability Loan can not(reference room) Due Date Make a Reservation Service M

Contents information

Table of Contents

Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Overview of Spring 5 and Spring Security 5 -- How examples are structured -- New-generation application requirements -- Reactive programming -- Reactive applications -- Reactive Manifesto -- Responsive -- Resilient -- Elastic -- Message-driven -- Spring Framework -- Reactive Landscape in Java -- Reactive Streams and Reactive Streams Specifications -- Non-blocking -- Backpressure -- Reactive Extensions -- RxJava -- Reactive Streams and RxJava -- JDK 9 additions -- Important interfaces -- The Publisher Interface -- The Subscriber Interface -- The Subscription interface -- The Processor interface -- Spring Framework and reactive applications -- Modules in Reactor -- Reactive types in Reactor Core -- The Flux reative type -- The Mono reactive type -- Data stream types -- Reactor and RxJava -- Reactive Web Application -- Spring WebFlux -- Reactive Spring Web -- WebClient -- WebSockets -- Application security -- Spring Security -- Spring Security terminologies -- Spring Security''s core features -- Authentication -- Authorization -- Spring Security 5''s new features -- Working of Spring Security -- Servlet Filter -- Filter Chain -- Security Interceptor (DelegatingFilterProxy) -- Core Spring Security modules -- Summary -- Chapter 2: Deep Diving into Spring Security -- Authentication -- Setting up AuthenticationManager -- AuthenticationProvider -- Custom AuthenticationProvider -- Multiple AuthenticationProvider -- Sample application -- Base project setup -- Step 1—Create a Maven project in IntelliJ IDEA -- Step 2—pom.xml changes -- Step 3—MySQL database schema setup -- Step 4—Setting up MySQL database properties in your project -- Step 5—Spring application configuration -- Step 6—Web application configuration -- Step 7—Spring MVC setup -- Step 8—Controller setup -- Step 9—JSP creation -- Spring Security setup -- Step 1—Spring Security configuration setup -- Step 2—Spring Security setup for a web application -- Running the application -- In-memory user storage -- Run as Spring Boot -- Authorization -- Web URL -- Method invocation -- Domain instance -- Other Spring Security capabilities -- Summary -- Chapter 3: Authentication Using SAML, LDAP, and OAuth/OIDC -- Security Assertion Markup Language -- Setting up an SSO provider -- Setting up the project -- The pom.xml file setup -- The application.yml file setup -- The Spring Security configuration files -- The resources folder setup -- Running and testing the application -- Lightweight Directory Access Protocol -- Set up dependencies in the pom.xml file -- Spring Security configuration -- LDAP server setup -- Setting up users in the LDAP server -- Running the application -- Seeing the application in action on a browser -- OAuth2 and OpenID Connect -- Setting up a project -- Bootstrap Spring project using Spring Initializr -- Inclusion of OAuth libraries in pom.xml -- Setting .

New Arrivals Books in Related Fields

Ramamurthy, Bina (2021)
윤관식 (2020)