<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Pro spring security</title>
    <subTitle>securing spring framework 5 and boot 2-based java applications</subTitle>
  </titleInfo>
  <name type="personal">
    <namePart>Scarioni, Carlo.</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <name type="personal">
    <namePart>Nardone Massimo.</namePart>
  </name>
  <name type="corporate">
    <namePart>SpringerLink (Online service)</namePart>
  </name>
  <name type="corporate">
    <namePart>O'Reilly (Firm)</namePart>
  </name>
  <name type="corporate">
    <namePart>Serials Solutions</namePart>
  </name>
  <typeOfResource>text</typeOfResource>
  <genre authority="local">Electronic books.</genre>
  <originInfo>
    <place>
      <placeTerm type="code" authority="marccountry">xxu</placeTerm>
    </place>
    <place>
      <placeTerm type="text">New York</placeTerm>
    </place>
    <publisher>Apress</publisher>
    <dateIssued>2022</dateIssued>
    <dateIssued encoding="marc">2019</dateIssued>
    <edition>2nd ed.</edition>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
  </language>
  <physicalDescription>
    <extent>xviii,410p. ; 25.5 cm.</extent>
  </physicalDescription>
  <abstract>Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security, Second Edition has been updated to incorporate the changes in Spring Framework 5 and Spring Boot 2. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up. This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications. You will: Explore the scope of security and how to use the Spring Security Framework Master Spring security architecture and design Secure the web tier in Spring Work with alternative authentication providers Take advantage of business objects and logic security Extend Spring security with other frameworks and languages Secure the service layer.</abstract>
  <tableOfContents>1. The Scope of Security -- 2. Introducing Spring Security -- 3. Set up the scene -- 4. Spring Security Architecture and Design -- 5. Web Security -- 6. Configuring Alternative Authentication Providers -- 7. Business Objects Security with ACLs -- 8. Customizing and Extending Spring Security -- 9. Integrating Spring Security with Other Frameworks and Languages -- Appendix A: References.</tableOfContents>
  <note type="statement of responsibility">By Carlo Scarioni and Massimo Nardone.</note>
  <note>Requires an SPL library card.</note>
  <note>Mode of access: World Wide Web.</note>
  <subject authority="lcsh">
    <topic>Java (Computer program language)</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Software engineering</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Data protection</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Configuring alternative authentication providers</topic>
  </subject>
  <classification authority="lcc">QA76.73.J38</classification>
  <classification authority="ddc" edition="2">006.671 SCAC</classification>
  <relatedItem type="host">
    <titleInfo>
      <title>Springer eBooks</title>
    </titleInfo>
  </relatedItem>
  <relatedItem type="otherFormat" displayLabel="Printed edition:"/>
  <relatedItem type="otherFormat" displayLabel="Printed edition:"/>
  <identifier type="isbn">9781484250518</identifier>
  <identifier type="uri">https://ezproxy.spl.org/login?url=https://learning.oreilly.com/library/view/~/9781484250525/?ar</identifier>
  <location>
    <url displayLabel="View this electronic item in O'Reilly Online Learning: Academic/Public Library Edition.">https://ezproxy.spl.org/login?url=https://learning.oreilly.com/library/view/~/9781484250525/?ar</url>
  </location>
  <accessCondition type="restrictionOnAccess">Requires an SPL library card.</accessCondition>
  <recordInfo>
    <recordContentSource authority="marcorg"/>
    <recordCreationDate encoding="marc">191121</recordCreationDate>
    <recordChangeDate encoding="iso8601">20220427100702.0</recordChangeDate>
    <recordIdentifier source="WaSeSS">ssj0002265330</recordIdentifier>
    <languageOfCataloging>
      <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
    </languageOfCataloging>
  </recordInfo>
</mods>
