Spring Security 3
|Also available on:|
- Make your web applications impenetrable.
- Implement authentication and authorization of users.
- Integrate Spring Security 3 with common external security providers.
- Packed full with concrete, simple, and concise examples.
Book DetailsLanguage : English
Paperback : 396 pages [ 235mm x 191mm ]
Release Date : May 2010
ISBN : 1847199747
ISBN 13 : 9781847199744
Author(s) : Peter Mularien
Topics and Technologies : All Books, Application Development, Security and Testing, Java, Open Source
Table of Contents
Chapter 1: Anatomy of an Unsafe Application
Chapter 2: Getting Started with Spring Security
Chapter 3: Enhancing the User Experience
Chapter 4: Securing Credential Storage
Chapter 5: Fine-Grained Access Control
Chapter 6: Advanced Configuration and Extension
Chapter 7: Access Control Lists
Chapter 8: Opening up to OpenID
Chapter 9: LDAP Directory Services
Chapter 10: Single Sign On with Central Authentication Service
Chapter 11: Client Certificate Authentication
Chapter 12: Spring Security Extensions
Chapter 13: Migration to Spring Security 3
Appendix: Additional Reference Material
This is an excellent book, well written, up-to-date, complete, with relevant examples and code. Spring Security 3 deserves a place in your library regardless of your level of involvement in developing web applications. Read More
Download the code and support files for this book.
Please let us know if you have found any errors not listed on this list by completing our errata submission form. Our editors will check them and add them to this list. Thank you.
Errata- 1 submitted: last submission 06 Dec 2012
Errata type: Typo | Page number: 28 and 36
should be: <filter-class>
What you will learn from this book
- Recognize design flaws that will make your applications unsafe.
- Implement basic authorization and credential storage.
- Move seamlessly from Spring Security 2 to Spring Security 3.
- Provide Enterprise adaptability with LDAP, Active Directory, and NTLM.
- Push the Boundaries of Spring Security 3 through Extension and Customization.
- Integrate in-house applications and popular Java frameworks with Spring Security 3.
- Plan the configuration of Spring Security 3 to accommodate the authentication and authorization requirements of your application.
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.
A comprehensive guide to Spring Security 3. You will learn through real world business scenarios how to guard against the latest threats. You will also learn to combine Spring Security 3 with external security providers such as LDAP, OpenID, CAS, Kerberos, and Active Directory.
The book starts by giving an overview of security concepts and techniques, as well as setup and configuration. The book then gets you working with a JSP based web application that implements a simple e-commerce website. At this point you will progressively enhance the application giving you hands on experience implementing features of Spring Security 3 in real world business scenarios.
The second half of the book is devoted to common integration scenarios that you will come accross every day. At this stage you will be in a position to solve specific, complex integration problems. The book will end by showing migration from Spring Security 2 to 3.
This practical guide will show you how to implement Spring Security 3 and protect your applications from being breached using a combination of real world, straightforward examples.
The book starts by teaching the basic fundamentals of Spring Security 3 such as setup and configuration. Later it looks at more advanced topics showing the reader how to solve complex real world security issues.
Who this book is for
This book is for Java developers who build web projects and applications. The book assumes basic familiarity with Java, XML and the Spring Framework. Newcomers to Spring Security will still be able to utilize all aspects of this book.