- Hands-On Spring Security 5 for Reactive Applications
- Tomcy John
- 250字
- 2021-07-23 18:59:07
Preface
Security is one of the most difficult and high-pressured concerns of creating an application. The complexity of properly securing an application is compounded when you must integrate this with existing code, new technologies, and other frameworks. This book will show readers how to easily secure their Java applications with the tied-and-tested Spring Security framework, the highly customizable and powerful authentication and authorization framework.
Spring Security is a well-known and established Java/JEE framework that can provide enterprise-grade security features for your application with no trouble. It also has modules that enable us to integrate with a variety of authentication mechanisms, and we will be delving into each of those using hands-on coding in this book.
Many examples will still be explained using the Spring MVC web application framework, but will still have a flavor of reactive programming to them.
Reactive programming is gaining traction, and this aspect of Spring Security will be covered by showcasing Spring Security integration with the Spring WebFlux web application framework. In addition to reactive programming, the book will also delve into other Spring Security features in detail.
Finally, we will also bring in some of the products available on the market that can be used along with Spring Security to achieve some of the security features needed in modern applications. These products offer new/enhanced security capabilities, and work in harmony with Spring Security in all aspects. Some of the products discussed are also fully endorsed and supported by the Spring community.
- 信息安全導(dǎo)論(在線實驗+在線自測)
- 腦洞大開:滲透測試另類實戰(zhàn)攻略
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- 數(shù)字化轉(zhuǎn)型浪潮下的數(shù)據(jù)安全最佳實踐指南
- Computer Forensics with FTK
- Digital Forensics with Kali Linux
- API安全技術(shù)與實戰(zhàn)
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 解密數(shù)據(jù)恢復(fù)
- 從實踐中學習密碼安全與防護
- 數(shù)據(jù)安全架構(gòu)設(shè)計與實戰(zhàn)
- Bug Bounty Hunting Essentials
- 黑客攻防從入門到精通:命令版
- Web安全攻防從入門到精通