Table of Contents

Spring Security in Action by Laurentiu Spilca

Return to Manning Spring Series, Spring Security, Java Security, Security, DevOps Security - Security SRE - CI/CD Security, Cloud Native Security - Microservices Security - Serverless Security, DevSecOps, Parallel Programming and Security, Concurrency and Security, Database Security, Data Science Security, Machine Learning Security, Cybersecurity Bibliography, Cybersecurity Courses, Cybersecurity Glossary, Awesome Cybersecurity, Cybersecurity GitHub, Cybersecurity Topics

Fair Use Source: B0977ZG6FZ (SprSecAct 2022)

Book Summary

Spring Security in Action shows you how to prevent cross-site scripting and request forgery attacks before they do damage. You’ll start with the basics, simulating password upgrades and adding multiple types of authorization. As your security skills grow, you'll adapt Spring Security to new Java architectures and create advanced OAuth2 configurations. By the time you're done, you'll have a customized Spring Security configuration that protects against threats both common and extraordinary.

Summary

While creating secure applications is critically important, it can also be tedious and time-consuming to stitch together the required collection of security tools. For Java developers, the powerful Spring Security framework makes it easy for you to bake Java security into your software from the very beginning. Filled with Spring Security code samples and practical examples, Spring Security in Action teaches you how to secure your apps from the most common threats, ranging from injection attacks to lackluster monitoring. In it, you'll learn how to manage system users, configure secure endpoints, and use OAuth2 and OpenID Connect for Java authentication and Java authorization.

About the technology

Security is non-negotiable. You rely on Spring applications to transmit data, verify credentials, and prevent attacks. Adopting “secure by design” principles will protect your network from data theft and unauthorized access / intrusions.

What's inside

About the reader

For experienced Java developers and Spring developers.

Table of Contents

PART 1 - FIRST STEPS

PART 2 - IMPLEMENTATION

About the Author

Lauretiu Spilca is a skilled Java developer and Spring developer and an experienced technology instructor. He is the author of Manning’s Spring Start Here and Spring Security in Action. He is a dedicated development lead and trainer at Endava, with over ten years of Java experience.

Product Details

Research More

Security Research:

Security - Pentesting

JVM - Java-Kotlin-Scala-Clojure - Android - Spring Boot

Tutorials

Support

Fair Use Sources

Fair Use Sources:

Java Security: Java DevSecOps, java.security (java.security.cert, java.security.interfaces, java.security.spec), Java Vulnerabilities, Java Cybersecurity, DevSecOps - Java Security Automation, Maven Security, Gradle Security, Spring Security (Spring Security in Action), Quarkus Security; Java Security Today, Hello Java Security, Java Managing users, Java Dealing with passwords, Java Implementing authentication, Java Configuring authorization - Java Restricting access, Java Implementing filters, Java CSRF protection, Java CORS, Java separation of responsibilities, Java OAuth 2, Java authorization server, Java resource server, Java JWT, Java cryptographic signatures, Java Global method security - Java Pre-authorization - Java Post-authorizations, Java Global method security - Java Pre-filtering, Java Post-filtering, Java OAuth 2 application, Java Security for reactive apps, Java Security testing; Android Security, Java Windows Security - Java Windows Server Security, Java Linux Security (Java Ubuntu Security, Java Debian Security, Java RHEL Security, Java Fedora Security), Java UNIX Security (Java FreeBSD Security), Java Passwords, Java Linux Passwords, Java Windows Passwords), Java Hacking (Java Ethical Hacking, Java White Hat, Java Black Hat, Java Grey Hat), Java Pentesting (Java Red Team - Java Blue Team - Java Purple Team), Java Mitre Framework, Java Common Vulnerabilities and Exposures (CVE), Java Cybersecurity Bibliography, Java Security Courses, Java Security CI/CD, Java Functional Programming and Security, Cybersecurity and Java Concurrency, Cybersecurity and Java Data Science Cybersecurity and Java Databases, Cybersecurity and Java Machine Learning, Java Cybersecurity Glossary, Awesome Cybersecurity, Java Security GitHub, Java Cybersecurity Topics (navbar_java_security. See also navbar_security, navbar_encryption, navbar_passwords, navbar_pentesting)

Spring: Spring Fundamentals, Spring Inventor - Spring Framework Designer: Rod Johnson in his Spring Book Expert One-on-One J2EE Design and Development on October 1, 2002; Spring Boot, Spring Framework, Spring Projects (Spring Boot, Spring Framework, Spring Data, Spring Security, Spring Cloud, Spring Batch, Spring Integration, Spring Web MVC, Spring REST Docs, Spring AMQP, Spring Kafka, Spring Shell, Spring WebFlux, Spring LDAP, Spring Session, Spring Test, Spring HATEOAS, Spring Web Services, Spring Data JDBC, Spring Data JPA, Spring Data MongoDB, Spring Data Redis, Spring Data Elasticsearch, Spring Data Neo4j, Spring Data Solr, Spring Data Cassandra, Spring Data Gemfire, Spring Data Couchbase, Spring Data DynamoDB, Spring Data R2DBC, Spring Data KeyValue, Spring Data Commons, Spring Cloud Config, Spring Cloud Netflix, Spring Cloud Stream, Spring Cloud Sleuth, Spring Cloud Gateway, Spring Cloud Kubernetes, Spring Cloud Function, Spring Cloud Task, Spring Cloud Contract, Spring Cloud Vault, Spring Cloud Data Flow, Spring Cloud Security, Spring Cloud Bus, Spring Cloud AWS, Spring Cloud GCP, Spring Cloud Azure, Spring Batch Admin, Spring Roo, Spring Statemachine, Spring XD, Spring Mobile, Spring Cloud Connectors, Spring for Android, Spring Shell 2, Spring Boot Admin, Spring PetClinic, Spring Rich Client, Spring LDAP Template, Spring Data Envers, Spring Data REST, Spring Dynamic Modules, Spring BlazeDS Integration, Spring for Apache Hadoop, Spring Web Flow, Spring Android, Spring Python, Spring LDAP Authentication, Spring LDAP Pooling, Spring LDAP Auth Provider, Spring Security ACL, Spring Social, Spring Security CAS, Spring Security Kerberos, Spring Web Services Security, Spring Vault, Spring Batch Extensions, Spring Cloud Services, Spring Data Geode, Spring Data ArangoDB, Spring Data Delta Spike, Spring Data JDBC Extensions, Spring Data for Apache Cassandra, Spring Data for Apache Geode, Spring Data for Apache Solr, Spring Data for Apache HBase, Spring Data for Apache Kafka, Spring Data for Apache Ignite, Spring Data for Apache CouchDB, Spring Data for Apache Accumulo, Spring Data for Apache MongoDB, Spring Data for Apache Cassandra Reactive, Spring Data for Apache Solr Reactive, Spring Data for Apache Geode Reactive, Spring Data for Apache Hadoop Reactive, Spring Data for Apache Couchbase Reactive

Spring Boot Deployment, Spring Boot Configuration, Spring Boot Installation, Spring Boot Containerization - Cloud Native Spring, Spring Microservices, Spring DevOps, Spring Security - Spring DevSecOps (Spring Security in Action and Spring Security Core - Beginner to Guru Class by John Thompson), Spring Bibliography, Manning Spring Series, Spring Boot Topics, Awesome Spring, Spring GitHub. (navbar_spring - navbar_spring_detailed)

Manning Publications: Manning Books Purchased by Cloud Monk, Manning Books Series, Manning Bibliography, In a Month of Lunches, In Action, Manning API Series, Manning "Functional Programming in" Series, Manning Concurrency Async Multithreaded Parallel Programming Series, Manning Grokking Series, Manning Java-JVM Languages Series (Manning Java Series, Manning Kotlin Series), Manning JavaScript Series, Manning TypeScript Series, Manning Microservices Series, Manning Python Series, Manning Security Series, Manning Spring Series, Manning SQL Series, Manning Database Series, Manning Data Science Series, Manning Mistakes and How to Avoid Them Series, Manning Books that were Cancelled, MEAP, Cloud Monk's Book Purchases, Cloud Monk Library. (navbar_manning)


© 1994 - 2024 Cloud Monk Losang Jinpa or Fair Use. Disclaimers

SYI LU SENG E MU CHYWE YE. NAN. WEI LA YE. WEI LA YE. SA WA HE.