OAuth 2 in Action
Seiten
2017
Manning Publications (Verlag)
978-1-61729-327-6 (ISBN)
Manning Publications (Verlag)
978-1-61729-327-6 (ISBN)
KEY FEATURES
• Hands-on examples
• Connect with major online services like Google, Facebook,
Twitter
• Takes the reader from beginner to advanced OAuth 2 topics.
AUDIENCE
Readers need basic programming skills and knowledge of HTTP and
JSON.
DESCRIPTION
OAuth 2 is like the web version of a valet key. Instead of unsafe
password-sharing, OAuth offers a much more secure delegation
protocol. OAuth is used everywhere, from large providers like
Facebook and Google, to small APIs at startups, and even cloud
services, it’s the worldwide standard. OAuth 2 is the must-know
security protocol on the web today.
OAuth 2 in Action teaches practical use and deployment of this
protocol from the perspective of a client, authorization server, and
resource server. It begins with an overview of OAuth and a look at its
components and interactions. Using hands-on examples, it shows how
to build a first OAuth client, followed by an authorization server, and
then a protected resource. The second part of the book dives into
crucial implementation vulnerability, and more advanced topics. By
the end of this book, anyone will be able to build and deploy
applications that use OAuth on both the client and server sides.
KEY FEATURES
• Hands-on examples
• Connect with major online services like Google, Facebook,
Twitter
• Takes the reader from beginner to advanced OAuth 2 topics.
AUDIENCE
Readers need basic programming skills and knowledge of HTTP and
JSON.
ABOUT THE TECHNOLOGY
This HTTP-based security protocol allows the users of a service to enable
applications to use that service on their behalf without handing over full
control. Web and mobile apps can securely access information from other
servers for users, enabling apps to give these users functionality and
services from other sites.
• Hands-on examples
• Connect with major online services like Google, Facebook,
• Takes the reader from beginner to advanced OAuth 2 topics.
AUDIENCE
Readers need basic programming skills and knowledge of HTTP and
JSON.
DESCRIPTION
OAuth 2 is like the web version of a valet key. Instead of unsafe
password-sharing, OAuth offers a much more secure delegation
protocol. OAuth is used everywhere, from large providers like
Facebook and Google, to small APIs at startups, and even cloud
services, it’s the worldwide standard. OAuth 2 is the must-know
security protocol on the web today.
OAuth 2 in Action teaches practical use and deployment of this
protocol from the perspective of a client, authorization server, and
resource server. It begins with an overview of OAuth and a look at its
components and interactions. Using hands-on examples, it shows how
to build a first OAuth client, followed by an authorization server, and
then a protected resource. The second part of the book dives into
crucial implementation vulnerability, and more advanced topics. By
the end of this book, anyone will be able to build and deploy
applications that use OAuth on both the client and server sides.
KEY FEATURES
• Hands-on examples
• Connect with major online services like Google, Facebook,
• Takes the reader from beginner to advanced OAuth 2 topics.
AUDIENCE
Readers need basic programming skills and knowledge of HTTP and
JSON.
ABOUT THE TECHNOLOGY
This HTTP-based security protocol allows the users of a service to enable
applications to use that service on their behalf without handing over full
control. Web and mobile apps can securely access information from other
servers for users, enabling apps to give these users functionality and
services from other sites.
Justin Richer is a systems architect, software engineer, standards editor, and service designer working as an independent consultant. Antonio Sanso works as Security Software Engineer, he is a vulnerability security researcher and an active open source contributor.
Erscheinungsdatum | 02.09.2016 |
---|---|
Verlagsort | New York |
Sprache | englisch |
Maße | 185 x 234 mm |
Gewicht | 608 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Mathematik / Informatik ► Informatik ► Programmiersprachen / -werkzeuge | |
Informatik ► Theorie / Studium ► Kryptologie | |
Mathematik / Informatik ► Informatik ► Web / Internet | |
ISBN-10 | 1-61729-327-X / 161729327X |
ISBN-13 | 978-1-61729-327-6 / 9781617293276 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Buch | Hardcover (2012)
Westermann Schulbuchverlag
34,95 €
Schulbuch Klassen 7/8 (G9)
Buch | Hardcover (2015)
Klett (Verlag)
30,50 €
Buch | Softcover (2004)
Cornelsen Verlag
25,25 €