Spring Security Core Beginner to Guru
Understand how to protect Java framework applications by learning cutting-edge Spring Security techniques About This Video Gain a deep understanding of Spring Security Explore the Spring Security toolset for authentication and authorization of users Become familiar with the Test-Driven Development (...
Gespeichert in:
1. Verfasser: | |
---|---|
Körperschaften: | , |
Format: | Elektronisch Video |
Sprache: | English |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
Packt Publishing
2020
|
Ausgabe: | 1st edition. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cgm a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-059852941 | ||
003 | DE-627-1 | ||
005 | 20240228121311.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 201119s2020 xx ||| |o o ||eng c | ||
020 | |a 9781800560000 |9 978-1-80056-000-0 | ||
020 | |a 1800560001 |9 1-80056-000-1 | ||
035 | |a (DE-627-1)059852941 | ||
035 | |a (DE-599)KEP059852941 | ||
035 | |a (ORHE)9781800560000 | ||
035 | |a (DE-627-1)059852941 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Thompson, John |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Spring Security Core |b Beginner to Guru |c Thompson, John |
250 | |a 1st edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b Packt Publishing |c 2020 | |
300 | |a 1 online resource (1 video file, approximately 10 hr., 48 min.) | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; Title from title screen (viewed September 30, 2020) | ||
520 | |a Understand how to protect Java framework applications by learning cutting-edge Spring Security techniques About This Video Gain a deep understanding of Spring Security Explore the Spring Security toolset for authentication and authorization of users Become familiar with the Test-Driven Development (TDD) approach In Detail Increasing cases of online security breaches have made it important for every organization to ensure that their applications are secure. With this video course, you'll explore Spring Security techniques that'll help you in authenticating and authorizing users, and protecting your applications from hazardous security breaches. The course begins with an introduction to Spring Security, enabling you to understand its importance in securing framework applications. You'll leverage the auto-configuration capabilities of Spring Boot to secure a web application using HTTP basic authentication. Next, you'll learn how to replace and customize the default Spring Boot auto-configuration with the help of a series of exercises. Moving ahead, you'll discover the unique security aspects in a Spring Boot web application that mimics a robust monolithic application with web pages and RESTful endpoints. Later, you'll follow a Test-Driven Development (TDD) approach to understand the features of Spring Security. With the help of interesting examples, you'll also be able to write a failing test using JUnit 5, Mockito, and Spring MockMVC By the end of this video course, you'll have developed the skills you need to use Spring Security to secure your framework applications. | ||
650 | 0 | |a Internet videos | |
650 | 0 | |a Streaming video | |
650 | 4 | |a Vidéos sur Internet | |
650 | 4 | |a Vidéo en continu | |
650 | 4 | |a streaming video | |
650 | 4 | |a Electronic videos | |
710 | 2 | |a O'Reilly for Higher Education (Firm), |e MitwirkendeR |4 ctb | |
710 | 2 | |a Safari, an O'Reilly Media Company. |e MitwirkendeR |4 ctb | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781800560000/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-059852941 |
---|---|
_version_ | 1818767385337790464 |
adam_text | |
any_adam_object | |
author | Thompson, John |
author_corporate | O'Reilly for Higher Education (Firm) Safari, an O'Reilly Media Company |
author_corporate_role | ctb ctb |
author_facet | Thompson, John O'Reilly for Higher Education (Firm) Safari, an O'Reilly Media Company |
author_role | aut |
author_sort | Thompson, John |
author_variant | j t jt |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)059852941 (DE-599)KEP059852941 (ORHE)9781800560000 |
edition | 1st edition. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03191cgm a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-059852941</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121311.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201119s2020 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781800560000</subfield><subfield code="9">978-1-80056-000-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1800560001</subfield><subfield code="9">1-80056-000-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)059852941</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP059852941</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781800560000</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)059852941</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Thompson, John</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Spring Security Core</subfield><subfield code="b">Beginner to Guru</subfield><subfield code="c">Thompson, John</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 video file, approximately 10 hr., 48 min.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; Title from title screen (viewed September 30, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Understand how to protect Java framework applications by learning cutting-edge Spring Security techniques About This Video Gain a deep understanding of Spring Security Explore the Spring Security toolset for authentication and authorization of users Become familiar with the Test-Driven Development (TDD) approach In Detail Increasing cases of online security breaches have made it important for every organization to ensure that their applications are secure. With this video course, you'll explore Spring Security techniques that'll help you in authenticating and authorizing users, and protecting your applications from hazardous security breaches. The course begins with an introduction to Spring Security, enabling you to understand its importance in securing framework applications. You'll leverage the auto-configuration capabilities of Spring Boot to secure a web application using HTTP basic authentication. Next, you'll learn how to replace and customize the default Spring Boot auto-configuration with the help of a series of exercises. Moving ahead, you'll discover the unique security aspects in a Spring Boot web application that mimics a robust monolithic application with web pages and RESTful endpoints. Later, you'll follow a Test-Driven Development (TDD) approach to understand the features of Spring Security. With the help of interesting examples, you'll also be able to write a failing test using JUnit 5, Mockito, and Spring MockMVC By the end of this video course, you'll have developed the skills you need to use Spring Security to secure your framework applications.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Streaming video</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéo en continu</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">streaming video</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic videos</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">O'Reilly for Higher Education (Firm),</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781800560000/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-059852941 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:49:02Z |
institution | BVB |
isbn | 9781800560000 1800560001 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 video file, approximately 10 hr., 48 min.) |
psigel | ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Packt Publishing |
record_format | marc |
spelling | Thompson, John VerfasserIn aut Spring Security Core Beginner to Guru Thompson, John 1st edition. [Erscheinungsort nicht ermittelbar] Packt Publishing 2020 1 online resource (1 video file, approximately 10 hr., 48 min.) zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; Title from title screen (viewed September 30, 2020) Understand how to protect Java framework applications by learning cutting-edge Spring Security techniques About This Video Gain a deep understanding of Spring Security Explore the Spring Security toolset for authentication and authorization of users Become familiar with the Test-Driven Development (TDD) approach In Detail Increasing cases of online security breaches have made it important for every organization to ensure that their applications are secure. With this video course, you'll explore Spring Security techniques that'll help you in authenticating and authorizing users, and protecting your applications from hazardous security breaches. The course begins with an introduction to Spring Security, enabling you to understand its importance in securing framework applications. You'll leverage the auto-configuration capabilities of Spring Boot to secure a web application using HTTP basic authentication. Next, you'll learn how to replace and customize the default Spring Boot auto-configuration with the help of a series of exercises. Moving ahead, you'll discover the unique security aspects in a Spring Boot web application that mimics a robust monolithic application with web pages and RESTful endpoints. Later, you'll follow a Test-Driven Development (TDD) approach to understand the features of Spring Security. With the help of interesting examples, you'll also be able to write a failing test using JUnit 5, Mockito, and Spring MockMVC By the end of this video course, you'll have developed the skills you need to use Spring Security to secure your framework applications. Internet videos Streaming video Vidéos sur Internet Vidéo en continu streaming video Electronic videos O'Reilly for Higher Education (Firm), MitwirkendeR ctb Safari, an O'Reilly Media Company. MitwirkendeR ctb TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781800560000/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Thompson, John Spring Security Core Beginner to Guru Internet videos Streaming video Vidéos sur Internet Vidéo en continu streaming video Electronic videos |
title | Spring Security Core Beginner to Guru |
title_auth | Spring Security Core Beginner to Guru |
title_exact_search | Spring Security Core Beginner to Guru |
title_full | Spring Security Core Beginner to Guru Thompson, John |
title_fullStr | Spring Security Core Beginner to Guru Thompson, John |
title_full_unstemmed | Spring Security Core Beginner to Guru Thompson, John |
title_short | Spring Security Core |
title_sort | spring security core beginner to guru |
title_sub | Beginner to Guru |
topic | Internet videos Streaming video Vidéos sur Internet Vidéo en continu streaming video Electronic videos |
topic_facet | Internet videos Streaming video Vidéos sur Internet Vidéo en continu streaming video Electronic videos |
url | https://learning.oreilly.com/library/view/-/9781800560000/?ar |
work_keys_str_mv | AT thompsonjohn springsecuritycorebeginnertoguru AT oreillyforhighereducationfirm springsecuritycorebeginnertoguru AT safarianoreillymediacompany springsecuritycorebeginnertoguru |