FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
|
|
- Title Pairing Apache Shiro and Java EE
- Author(s) Nebrass Lamouchi
- Publisher: InfoQ
- Paperback: N/A
- ebook PDF (74 pages, 5.9 MB)
- Language: English
- ISBN-10: N/A
- ISBN-13: N/A
- Share This:
When securing systems, two elements of security are important: authentication and authorization. Though the two terms mean different things, they are sometimes used interchangeably because of their respective roles in application security.
Get started with the fundamentals of web authentication and authorization using Apache Shiro Framework. Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management.
Learn how to use Shiro in a JavaEE7 application and how to use it in a web application. This book will help you find out what Shiro actually is, and will help you to secure your Java EE project from scratch and to understand the security philosophy.
You will learn the big picture and how to set up Apache Shiro, which will give you a better understanding of the fundamentals of the framework. You will be introduced to the authentication and authorization flows and the different possible models of security.
You will get everything you need to start with Shiro immediately with just essential information.
About the Authors- Nebrass Lamouchi is a Java Developer & an OWASP Project Leader. He lives and works in Paris. He is a Java technology enthusiast, trainer and speaker. Recently, Nebrass joined the NetBeans Dream Team.
- Java Security
- Enterprise Java and Web Services
- Advanced Java Programming
- Java Build, Testing, and Deployment
- Free and Open Source Software (FOSS)
-
Practical Guide to Building an API Back End with Spring Boot
Starting your first project with Spring Boot can be a bit daunting given the vast options that it provides. This book will guide you step by step along the way to be a Spring Boot hero in no time.
-
Spring by Example (David Winterfeldt, et al)
This book covers Spring Framework. The topics in this book are introduced by complete and real-world code examples that you can follow step by step. Instead of abstract descriptions on complex concepts, you will find live examples in this book.
-
Software Architecture with Spring 5.0 (Rene Enriquez, et al)
This book explains in detail how to choose the right architecture and apply best practices during your software development cycle to avoid technical debt and support every business requirement, from scratch or is being refactored to support new demands.
-
Java Authentication and Authorization Service (JAAS) in Action
By the end of this book, you will both understand and use the functionality in JAAS, and also be able to replace many of the pieces provided by the JDK or whatever application server you may be using with your own custom classes.
-
Java 2 Network Security (Marco Pistoia, et al)
This book provides the complete insiders guide to securing Java 2 enterprise applications, with comprehensive coverage of the new Java 2 security models. Designed to help you integrate Java 2 into your enterprise security strategies.
-
Securing Java: Getting Down to Business with Mobile Code
This book navigates the uncharted waters of mobile code security and arms the reader with the knowledge required for securing Java. It reveals a menagerie of applets that have circumvented Java security to achieve a variety of noisome and damaging ends.
-
O'Reilly® Java Security (Scott Oaks)
This book provides the Java programmer with a complete overview of the Java security architecture and security classes, plus a wealth of detailed information and code examples for specific implementations.
-
UNIX System Security: A Guide for Users & System Administrators
This book begins by examining four high-profile breaches of UNIX security as illustrations of how a UNIX system can be attacked. It then provides the information necessary to protect against these forms of attack, and offers the tools.
-
Security of Ubiquitous Computing Systems (Gildas Avoine, et al)
It is to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework that lies along four axes: cryptographic models, cryptanalysis of building blocks, security engineering, and security assessment.
-
Security Engineering: Building Dependable Distributed Systems
It makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice, offers a lot of thoughts on how information can be made more secure by both technologies and strategies.
:
|
|