Listing 1 - 2 of 2 |
Sort by
|
Choose an application
Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications by using the Spring Security Framework. Provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications.
Application software -- Development. --- Application software -- Security measures. --- Computer networks -- Security measures. --- Java (Computer program language). --- Web site development. --- Engineering & Applied Sciences --- Computer Science --- Information Technology --- Computer Science (Hardware & Networks) --- General and Others --- Application software --- Java (Computer program language) --- Computer networks --- Security measures. --- Development. --- Computer network security --- Network security, Computer --- Security of computer networks --- Development of Web sites --- Web sites --- Development of application software --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Development --- Computer science. --- Computer Science. --- Computer Science, general. --- Informatics --- Science --- Computer security --- Internet programming --- Object-oriented programming languages --- JavaSpaces technology --- Computer software --- Software engineering. --- Java. --- Software Engineering/Programming and Operating Systems. --- Computer software engineering --- Engineering --- Computer security.
Choose an application
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this
Application software - Security measures. --- Computer crimes - Prevention. --- Computer networks - Security measures. --- Computer networks -- Security measures. --- Computer networks. --- Computer security. --- Web site development - Security measures. --- Web sites -- Security measures. --- Computer networks --- Web site development --- Application software --- Computer security --- Computer crimes --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Security measures --- Prevention --- Security measures. --- Prevention. --- Information Technology --- General and Others --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Development of Web sites --- Web sites --- Computer network security --- Network security, Computer --- Security of computer networks --- Development --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Computer software --- Internet programming --- 004.5 --- apps --- hacken --- Mens-computer interactie. Mens-machine interface. User interface. Gebruikersomgeving
Listing 1 - 2 of 2 |
Sort by
|