Hands-on Spring security 5.1.1:
"Securing your application from hackers is the most high-pressure concerns for developers. In this course, you'll learn how to protect your Java application from malicious attacks and users with the Spring Security framework. You'll integrate Spring Security into your application usin...
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Packt Publishing
2019
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781789802931/?ar |
Zusammenfassung: | "Securing your application from hackers is the most high-pressure concerns for developers. In this course, you'll learn how to protect your Java application from malicious attacks and users with the Spring Security framework. You'll integrate Spring Security into your application using the Spring frameworks through practical, hands-on examples. You'll see how to secure your web application, integrate authentication and authorization mechanisms, and restrict access to your application. You'll discover how to integrate it with popular frameworks such as Spring Web MVC, Spring-Boot, Spring-Data, Servlet API injection, and more. We'll cover the security challenges with Reactive web apps built for the cloud, RESTful web services, and microservice architectures with the Spring framework. You'll also implement techniques for protection against attacks such as session fixation, clickjacking, cross-site request forgery, and more. By the end of the course, you'll understand common security vulnerabilities and be able to prevent them with Spring Security, with an empirical approach to securing your web applications."--Resource description page |
Beschreibung: | Title from resource description page (Safari, viewed March 26, 2019) |
Umfang: | 1 online resource (1 streaming video file (1 hr., 16 min., 49 sec.)) |
Internformat
MARC
LEADER | 00000cgm a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047731419 | ||
003 | DE-627-1 | ||
005 | 20240228120659.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2019 xx ||| |o o ||eng c | ||
035 | |a (DE-627-1)047731419 | ||
035 | |a (DE-599)KEP047731419 | ||
035 | |a (ORHE)9781789802931 | ||
035 | |a (DE-627-1)047731419 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Lelek, Tomasz |e RednerIn |4 spk | |
245 | 1 | 0 | |a Hands-on Spring security 5.1.1 |c Tomasz Lelek |
264 | 1 | |a [Place of publication not identified] |b Packt Publishing |c 2019 | |
300 | |a 1 online resource (1 streaming video file (1 hr., 16 min., 49 sec.)) | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Title from resource description page (Safari, viewed March 26, 2019) | ||
520 | |a "Securing your application from hackers is the most high-pressure concerns for developers. In this course, you'll learn how to protect your Java application from malicious attacks and users with the Spring Security framework. You'll integrate Spring Security into your application using the Spring frameworks through practical, hands-on examples. You'll see how to secure your web application, integrate authentication and authorization mechanisms, and restrict access to your application. You'll discover how to integrate it with popular frameworks such as Spring Web MVC, Spring-Boot, Spring-Data, Servlet API injection, and more. We'll cover the security challenges with Reactive web apps built for the cloud, RESTful web services, and microservice architectures with the Spring framework. You'll also implement techniques for protection against attacks such as session fixation, clickjacking, cross-site request forgery, and more. By the end of the course, you'll understand common security vulnerabilities and be able to prevent them with Spring Security, with an empirical approach to securing your web applications."--Resource description page | ||
630 | 2 | 0 | |a Spring (Software framework) |
650 | 0 | |a Application software |x Development | |
650 | 0 | |a Web applications |x Security measures | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Spring (Software framework) |0 (OCoLC)fst01938500 | |
650 | 4 | |a Logiciels d'application ; Développement | |
650 | 4 | |a Applications Web ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Application software ; Development |0 (OCoLC)fst00811707 | |
650 | 4 | |a Computer security |0 (OCoLC)fst00872484 | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781789802931/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047731419 |
---|---|
_version_ | 1833357154767077376 |
adam_text | |
any_adam_object | |
author2 | Lelek, Tomasz |
author2_role | spk |
author2_variant | t l tl |
author_facet | Lelek, Tomasz |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047731419 (DE-599)KEP047731419 (ORHE)9781789802931 |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02837cgm a22004572c 4500</leader><controlfield tag="001">ZDB-30-ORH-047731419</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120659.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2019 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047731419</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047731419</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781789802931</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047731419</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lelek, Tomasz</subfield><subfield code="e">RednerIn</subfield><subfield code="4">spk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hands-on Spring security 5.1.1</subfield><subfield code="c">Tomasz Lelek</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 streaming video file (1 hr., 16 min., 49 sec.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from resource description page (Safari, viewed March 26, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Securing your application from hackers is the most high-pressure concerns for developers. In this course, you'll learn how to protect your Java application from malicious attacks and users with the Spring Security framework. You'll integrate Spring Security into your application using the Spring frameworks through practical, hands-on examples. You'll see how to secure your web application, integrate authentication and authorization mechanisms, and restrict access to your application. You'll discover how to integrate it with popular frameworks such as Spring Web MVC, Spring-Boot, Spring-Data, Servlet API injection, and more. We'll cover the security challenges with Reactive web apps built for the cloud, RESTful web services, and microservice architectures with the Spring framework. You'll also implement techniques for protection against attacks such as session fixation, clickjacking, cross-site request forgery, and more. By the end of the course, you'll understand common security vulnerabilities and be able to prevent them with Spring Security, with an empirical approach to securing your web applications."--Resource description page</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Spring (Software framework)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Development</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web applications</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Spring (Software framework)</subfield><subfield code="0">(OCoLC)fst01938500</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels d'application ; Développement</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Applications Web ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software ; Development</subfield><subfield code="0">(OCoLC)fst00811707</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="0">(OCoLC)fst00872484</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781789802931/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047731419 |
illustrated | Not Illustrated |
indexdate | 2025-05-28T09:47:11Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 streaming video file (1 hr., 16 min., 49 sec.)) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Packt Publishing |
record_format | marc |
spelling | Lelek, Tomasz RednerIn spk Hands-on Spring security 5.1.1 Tomasz Lelek [Place of publication not identified] Packt Publishing 2019 1 online resource (1 streaming video file (1 hr., 16 min., 49 sec.)) zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Title from resource description page (Safari, viewed March 26, 2019) "Securing your application from hackers is the most high-pressure concerns for developers. In this course, you'll learn how to protect your Java application from malicious attacks and users with the Spring Security framework. You'll integrate Spring Security into your application using the Spring frameworks through practical, hands-on examples. You'll see how to secure your web application, integrate authentication and authorization mechanisms, and restrict access to your application. You'll discover how to integrate it with popular frameworks such as Spring Web MVC, Spring-Boot, Spring-Data, Servlet API injection, and more. We'll cover the security challenges with Reactive web apps built for the cloud, RESTful web services, and microservice architectures with the Spring framework. You'll also implement techniques for protection against attacks such as session fixation, clickjacking, cross-site request forgery, and more. By the end of the course, you'll understand common security vulnerabilities and be able to prevent them with Spring Security, with an empirical approach to securing your web applications."--Resource description page Spring (Software framework) Application software Development Web applications Security measures Computer security Computer Security Spring (Software framework) (OCoLC)fst01938500 Logiciels d'application ; Développement Applications Web ; Sécurité ; Mesures Sécurité informatique Application software ; Development (OCoLC)fst00811707 Computer security (OCoLC)fst00872484 |
spellingShingle | Hands-on Spring security 5.1.1 Spring (Software framework) Application software Development Web applications Security measures Computer security Computer Security Spring (Software framework) (OCoLC)fst01938500 Logiciels d'application ; Développement Applications Web ; Sécurité ; Mesures Sécurité informatique Application software ; Development (OCoLC)fst00811707 Computer security (OCoLC)fst00872484 |
subject_GND | (OCoLC)fst01938500 (OCoLC)fst00811707 (OCoLC)fst00872484 |
title | Hands-on Spring security 5.1.1 |
title_auth | Hands-on Spring security 5.1.1 |
title_exact_search | Hands-on Spring security 5.1.1 |
title_full | Hands-on Spring security 5.1.1 Tomasz Lelek |
title_fullStr | Hands-on Spring security 5.1.1 Tomasz Lelek |
title_full_unstemmed | Hands-on Spring security 5.1.1 Tomasz Lelek |
title_short | Hands-on Spring security 5.1.1 |
title_sort | hands on spring security 5 1 1 |
topic | Spring (Software framework) Application software Development Web applications Security measures Computer security Computer Security Spring (Software framework) (OCoLC)fst01938500 Logiciels d'application ; Développement Applications Web ; Sécurité ; Mesures Sécurité informatique Application software ; Development (OCoLC)fst00811707 Computer security (OCoLC)fst00872484 |
topic_facet | Spring (Software framework) Application software Development Web applications Security measures Computer security Computer Security Logiciels d'application ; Développement Applications Web ; Sécurité ; Mesures Sécurité informatique Application software ; Development |
work_keys_str_mv | AT lelektomasz handsonspringsecurity511 |