Spring Security Core Beginner to Guru

Understand how to protect Java framework applications by learning cutting-edge Spring Security techniques About This Video Gain a deep understanding of Spring Security Explore the Spring Security toolset for authentication and authorization of users Become familiar with the Test-Driven Development (...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Thompson, John (VerfasserIn)
Körperschaften: O'Reilly for Higher Education (Firm) (MitwirkendeR), Safari, an O'Reilly Media Company (MitwirkendeR)
Format: Elektronisch Video
Sprache:English
Veröffentlicht: [Erscheinungsort nicht ermittelbar] Packt Publishing 2020
Ausgabe:1st edition.
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cgm a22000002 4500
001 ZDB-30-ORH-059852941
003 DE-627-1
005 20240228121311.0
006 m o | |
007 cr uuu---uuuuu
008 201119s2020 xx ||| |o o ||eng c
020 |a 9781800560000  |9 978-1-80056-000-0 
020 |a 1800560001  |9 1-80056-000-1 
035 |a (DE-627-1)059852941 
035 |a (DE-599)KEP059852941 
035 |a (ORHE)9781800560000 
035 |a (DE-627-1)059852941 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
100 1 |a Thompson, John  |e VerfasserIn  |4 aut 
245 1 0 |a Spring Security Core  |b Beginner to Guru  |c Thompson, John 
250 |a 1st edition. 
264 1 |a [Erscheinungsort nicht ermittelbar]  |b Packt Publishing  |c 2020 
300 |a 1 online resource (1 video file, approximately 10 hr., 48 min.) 
336 |a zweidimensionales bewegtes Bild  |b tdi  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Online resource; Title from title screen (viewed September 30, 2020) 
520 |a Understand how to protect Java framework applications by learning cutting-edge Spring Security techniques About This Video Gain a deep understanding of Spring Security Explore the Spring Security toolset for authentication and authorization of users Become familiar with the Test-Driven Development (TDD) approach In Detail Increasing cases of online security breaches have made it important for every organization to ensure that their applications are secure. With this video course, you'll explore Spring Security techniques that'll help you in authenticating and authorizing users, and protecting your applications from hazardous security breaches. The course begins with an introduction to Spring Security, enabling you to understand its importance in securing framework applications. You'll leverage the auto-configuration capabilities of Spring Boot to secure a web application using HTTP basic authentication. Next, you'll learn how to replace and customize the default Spring Boot auto-configuration with the help of a series of exercises. Moving ahead, you'll discover the unique security aspects in a Spring Boot web application that mimics a robust monolithic application with web pages and RESTful endpoints. Later, you'll follow a Test-Driven Development (TDD) approach to understand the features of Spring Security. With the help of interesting examples, you'll also be able to write a failing test using JUnit 5, Mockito, and Spring MockMVC By the end of this video course, you'll have developed the skills you need to use Spring Security to secure your framework applications. 
650 0 |a Internet videos 
650 0 |a Streaming video 
650 4 |a Vidéos sur Internet 
650 4 |a Vidéo en continu 
650 4 |a streaming video 
650 4 |a Electronic videos 
710 2 |a O'Reilly for Higher Education (Firm),  |e MitwirkendeR  |4 ctb 
710 2 |a Safari, an O'Reilly Media Company.  |e MitwirkendeR  |4 ctb 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781800560000/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
935 |c vide 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-059852941
_version_ 1818767385337790464
adam_text
any_adam_object
author Thompson, John
author_corporate O'Reilly for Higher Education (Firm)
Safari, an O'Reilly Media Company
author_corporate_role ctb
ctb
author_facet Thompson, John
O'Reilly for Higher Education (Firm)
Safari, an O'Reilly Media Company
author_role aut
author_sort Thompson, John
author_variant j t jt
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)059852941
(DE-599)KEP059852941
(ORHE)9781800560000
edition 1st edition.
format Electronic
Video
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03191cgm a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-059852941</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121311.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201119s2020 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781800560000</subfield><subfield code="9">978-1-80056-000-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1800560001</subfield><subfield code="9">1-80056-000-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)059852941</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP059852941</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781800560000</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)059852941</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Thompson, John</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Spring Security Core</subfield><subfield code="b">Beginner to Guru</subfield><subfield code="c">Thompson, John</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 video file, approximately 10 hr., 48 min.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; Title from title screen (viewed September 30, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Understand how to protect Java framework applications by learning cutting-edge Spring Security techniques About This Video Gain a deep understanding of Spring Security Explore the Spring Security toolset for authentication and authorization of users Become familiar with the Test-Driven Development (TDD) approach In Detail Increasing cases of online security breaches have made it important for every organization to ensure that their applications are secure. With this video course, you'll explore Spring Security techniques that'll help you in authenticating and authorizing users, and protecting your applications from hazardous security breaches. The course begins with an introduction to Spring Security, enabling you to understand its importance in securing framework applications. You'll leverage the auto-configuration capabilities of Spring Boot to secure a web application using HTTP basic authentication. Next, you'll learn how to replace and customize the default Spring Boot auto-configuration with the help of a series of exercises. Moving ahead, you'll discover the unique security aspects in a Spring Boot web application that mimics a robust monolithic application with web pages and RESTful endpoints. Later, you'll follow a Test-Driven Development (TDD) approach to understand the features of Spring Security. With the help of interesting examples, you'll also be able to write a failing test using JUnit 5, Mockito, and Spring MockMVC By the end of this video course, you'll have developed the skills you need to use Spring Security to secure your framework applications.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Streaming video</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéo en continu</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">streaming video</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic videos</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">O'Reilly for Higher Education (Firm),</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781800560000/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-059852941
illustrated Not Illustrated
indexdate 2024-12-18T08:49:02Z
institution BVB
isbn 9781800560000
1800560001
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 video file, approximately 10 hr., 48 min.)
psigel ZDB-30-ORH
publishDate 2020
publishDateSearch 2020
publishDateSort 2020
publisher Packt Publishing
record_format marc
spelling Thompson, John VerfasserIn aut
Spring Security Core Beginner to Guru Thompson, John
1st edition.
[Erscheinungsort nicht ermittelbar] Packt Publishing 2020
1 online resource (1 video file, approximately 10 hr., 48 min.)
zweidimensionales bewegtes Bild tdi rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Online resource; Title from title screen (viewed September 30, 2020)
Understand how to protect Java framework applications by learning cutting-edge Spring Security techniques About This Video Gain a deep understanding of Spring Security Explore the Spring Security toolset for authentication and authorization of users Become familiar with the Test-Driven Development (TDD) approach In Detail Increasing cases of online security breaches have made it important for every organization to ensure that their applications are secure. With this video course, you'll explore Spring Security techniques that'll help you in authenticating and authorizing users, and protecting your applications from hazardous security breaches. The course begins with an introduction to Spring Security, enabling you to understand its importance in securing framework applications. You'll leverage the auto-configuration capabilities of Spring Boot to secure a web application using HTTP basic authentication. Next, you'll learn how to replace and customize the default Spring Boot auto-configuration with the help of a series of exercises. Moving ahead, you'll discover the unique security aspects in a Spring Boot web application that mimics a robust monolithic application with web pages and RESTful endpoints. Later, you'll follow a Test-Driven Development (TDD) approach to understand the features of Spring Security. With the help of interesting examples, you'll also be able to write a failing test using JUnit 5, Mockito, and Spring MockMVC By the end of this video course, you'll have developed the skills you need to use Spring Security to secure your framework applications.
Internet videos
Streaming video
Vidéos sur Internet
Vidéo en continu
streaming video
Electronic videos
O'Reilly for Higher Education (Firm), MitwirkendeR ctb
Safari, an O'Reilly Media Company. MitwirkendeR ctb
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781800560000/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Thompson, John
Spring Security Core Beginner to Guru
Internet videos
Streaming video
Vidéos sur Internet
Vidéo en continu
streaming video
Electronic videos
title Spring Security Core Beginner to Guru
title_auth Spring Security Core Beginner to Guru
title_exact_search Spring Security Core Beginner to Guru
title_full Spring Security Core Beginner to Guru Thompson, John
title_fullStr Spring Security Core Beginner to Guru Thompson, John
title_full_unstemmed Spring Security Core Beginner to Guru Thompson, John
title_short Spring Security Core
title_sort spring security core beginner to guru
title_sub Beginner to Guru
topic Internet videos
Streaming video
Vidéos sur Internet
Vidéo en continu
streaming video
Electronic videos
topic_facet Internet videos
Streaming video
Vidéos sur Internet
Vidéo en continu
streaming video
Electronic videos
url https://learning.oreilly.com/library/view/-/9781800560000/?ar
work_keys_str_mv AT thompsonjohn springsecuritycorebeginnertoguru
AT oreillyforhighereducationfirm springsecuritycorebeginnertoguru
AT safarianoreillymediacompany springsecuritycorebeginnertoguru