Pro Spring Security - Carlo Scarioni, Massimo Nardone

Pro Spring Security (eBook)

Securing Spring Framework 5 and Boot 2-based Java Applications
eBook Download: PDF
2019 | 2nd ed.
XVIII, 410 Seiten
Apress (Verlag)
978-1-4842-5052-5 (ISBN)
Systemvoraussetzungen
56,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.

Pro Spring Security, Second Edition has been updated to incorporate the changes in Spring Framework 5 and Spring Boot 2. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up.

This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications.

What You Will Learn
  • Explore the scope of security and how to use the Spring Security Framework
  • Master Spring security architecture and design 
  • Secure the web tier in Spring 
  • Work with alternative authentication providers
  • Take advantage of business objects and logic security
  • Extend Spring security with other frameworks and languages
  • Secure the service layer

Who This Book Is For
Experienced Spring and Java developers with prior experience in building Spring Framework or Boot-based applications.



Carlo Scarioni is a passionate software developer, motivated by learning and applying innovative and interesting software development tools, techniques and methodologies, his professional objectives are the following.  To be in a technology-oriented enterprise where the technical staff is the soul of the company. To be in an important IT team. To be able to design and develop state of the art software. To be able to apply new knowledge every day, in innovative ways, and with a great degree of freedom. To architect, design and develop software that uses the best practices of the field. To play with the latest technologies, learn every day and participate in the research and innovation of software products. Specialties: TDD, object-oriented principles and design patterns, Java/JEE, Spring, application servers, SQL and NoSQL (MongoDB), multithreading, messaging, enterprise integration patterns, Ruby, and RoR.  Certifications are Sun Certified Enterprise Architect (Part I), Sun Certified Java Programmer, Sun Certified Business Component Developer, SpringSource Certified Professional, and IBM SOA Certified Associate.

Massimo Nardone has more than 24 years of experience in security, web/mobile development, cloud, and IT architecture. His true IT passions are security and Android. He has been programming and teaching how to program with Android, Perl, PHP, Java, VB, Python, C/C++, and MySQL for more than 20 years. He holds an M.Sc. degree in computing science from the University of Salerno, Italy. During his career, he has worked as a project manager, software engineer, research engineer, chief security architect, information security manager, PCI/SCADA auditor, and senior lead IT security/cloud/SCADA architect.

His technical skills include security, Android, cloud, Java, MySQL, Drupal, Cobol, Perl, web and mobile development, MongoDB, D3, Joomla!, Couchbase, C/C++, WebGL, Python, Pro Rails, Django CMS, Jekyll, and Scratch. He has served as a visiting lecturer and supervisor for exercises at the Networking Laboratory of the Helsinki University of Technology (Aalto University). He holds four international patents (PKI, SIP, SAML, and Proxy areas). He currently works as chief information security officer (CISO) for Cargotec Oyj, and he is a member of the ISACA Finland Chapter Board. Massimo has reviewed more than 45 IT books for different publishers and has coauthored Pro JPA 2 in Java EE 8 (Apress, 2018), Beginning EJB in Java EE 8 (Apress, 2018), and Pro Android Games (Apress, 2015).


Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.Pro Spring Security, Second Edition has been updated to incorporate the changes in Spring Framework 5 and Spring Boot 2. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up.This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications.What You Will LearnExplore the scope of security and how to use the Spring Security FrameworkMaster Spring security architecture and design Secure the web tier in Spring Work with alternative authentication providersTake advantage of business objects and logic securityExtend Spring security with other frameworks and languagesSecure the service layerWho This Book Is ForExperienced Spring and Java developers with prior experience in building Spring Framework or Boot-based applications.
Erscheint lt. Verlag 21.11.2019
Zusatzinfo XVIII, 410 p. 148 illus.
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Programmiersprachen / -werkzeuge
Mathematik / Informatik Informatik Software Entwicklung
Schlagworte API • build • Code • deploy • Develop • Enterprise • Java • secure • security • source • Spring Boot • Spring Framework • Spring Security
ISBN-10 1-4842-5052-4 / 1484250524
ISBN-13 978-1-4842-5052-5 / 9781484250525
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 9,6 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99