Hands-on Spring security 5 for reactive applications [electronic resource] : learn effective ways to secure your applications with Spring and Spring WebFlux
| 000 | 00000cam u2200205 a 4500 | |
| 001 | 000045985026 | |
| 005 | 20190530174132 | |
| 006 | m d | |
| 007 | cr | |
| 008 | 190529s2018 enka o 001 0 eng d | |
| 020 | ▼a 9781788990073 (electronic bk.) | |
| 020 | ▼a 1788990072 (electronic bk.) | |
| 020 | ▼a 9781788995979 | |
| 035 | ▼a 1862356 ▼b (N$T) | |
| 035 | ▼a (OCoLC)1050169819 | |
| 037 | ▼a CL0500000988 ▼b Safari Books Online | |
| 037 | ▼a 79595C3D-8350-4600-875E-29293D4CE5BC ▼b OverDrive, Inc. ▼n http://www.overdrive.com | |
| 040 | ▼a UMI ▼b eng ▼e rda ▼e pn ▼c UMI ▼d TEFOD ▼d N$T ▼d 211009 | |
| 050 | 4 | ▼a QA76.76.A65 |
| 082 | 0 4 | ▼a 005.25 ▼2 23 |
| 084 | ▼a 005.25 ▼2 DDCK | |
| 090 | ▼a 005.25 | |
| 100 | 1 | ▼a John, Tomcy. |
| 245 | 1 0 | ▼a Hands-on Spring security 5 for reactive applications ▼h [electronic resource] : ▼b learn effective ways to secure your applications with Spring and Spring WebFlux / ▼c Tomcy John. |
| 246 | 3 | ▼a Hands-on Spring security five for reactive applications |
| 260 | ▼a Birmingham, UK : ▼b Packt Publishing, ▼c 2018. | |
| 300 | ▼a 1 online resource (vii, 248 p.) : ▼b ill. | |
| 500 | ▼a Title from e-Book title page. | |
| 500 | ▼a Includes index. | |
| 530 | ▼a Issued also as a book. | |
| 538 | ▼a Mode of access: World Wide Web. | |
| 630 | 0 0 | ▼a Spring (Software framework). |
| 650 | 0 | ▼a Web applications ▼x Security measures. |
| 650 | 0 | ▼a Application software ▼x Development. |
| 650 | 0 | ▼a Computer security. |
| 856 | 4 0 | ▼3 EBSCOhost ▼u https://oca.korea.ac.kr/link.n2s?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1862356 |
| 945 | ▼a KLPA | |
| 991 | ▼a E-Book(소장) |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 중앙도서관/e-Book 컬렉션/ | 청구기호 CR 005.25 | 등록번호 E14012797 | 도서상태 대출불가(열람가능) | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
목차
Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Overview of Spring 5 and Spring Security 5 -- How examples are structured -- New-generation application requirements -- Reactive programming -- Reactive applications -- Reactive Manifesto -- Responsive -- Resilient -- Elastic -- Message-driven -- Spring Framework -- Reactive Landscape in Java -- Reactive Streams and Reactive Streams Specifications -- Non-blocking -- Backpressure -- Reactive Extensions -- RxJava -- Reactive Streams and RxJava -- JDK 9 additions -- Important interfaces -- The Publisher Interface -- The Subscriber Interface -- The Subscription interface -- The Processor interface -- Spring Framework and reactive applications -- Modules in Reactor -- Reactive types in Reactor Core -- The Flux reative type -- The Mono reactive type -- Data stream types -- Reactor and RxJava -- Reactive Web Application -- Spring WebFlux -- Reactive Spring Web -- WebClient -- WebSockets -- Application security -- Spring Security -- Spring Security terminologies -- Spring Security''s core features -- Authentication -- Authorization -- Spring Security 5''s new features -- Working of Spring Security -- Servlet Filter -- Filter Chain -- Security Interceptor (DelegatingFilterProxy) -- Core Spring Security modules -- Summary -- Chapter 2: Deep Diving into Spring Security -- Authentication -- Setting up AuthenticationManager -- AuthenticationProvider -- Custom AuthenticationProvider -- Multiple AuthenticationProvider -- Sample application -- Base project setup -- Step 1—Create a Maven project in IntelliJ IDEA -- Step 2—pom.xml changes -- Step 3—MySQL database schema setup -- Step 4—Setting up MySQL database properties in your project -- Step 5—Spring application configuration -- Step 6—Web application configuration -- Step 7—Spring MVC setup -- Step 8—Controller setup -- Step 9—JSP creation -- Spring Security setup -- Step 1—Spring Security configuration setup -- Step 2—Spring Security setup for a web application -- Running the application -- In-memory user storage -- Run as Spring Boot -- Authorization -- Web URL -- Method invocation -- Domain instance -- Other Spring Security capabilities -- Summary -- Chapter 3: Authentication Using SAML, LDAP, and OAuth/OIDC -- Security Assertion Markup Language -- Setting up an SSO provider -- Setting up the project -- The pom.xml file setup -- The application.yml file setup -- The Spring Security configuration files -- The resources folder setup -- Running and testing the application -- Lightweight Directory Access Protocol -- Set up dependencies in the pom.xml file -- Spring Security configuration -- LDAP server setup -- Setting up users in the LDAP server -- Running the application -- Seeing the application in action on a browser -- OAuth2 and OpenID Connect -- Setting up a project -- Bootstrap Spring project using Spring Initializr -- Inclusion of OAuth libraries in pom.xml -- Setting .
