-
Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2
Author Yvonne Wilson , Abhishek Hingnikar
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building ....
Release Date 2022/11 -
Advanced API Security: OAuth 2.0 and Beyond
Author Prabath Siriwardena
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is conv....
Release Date 2019/12 -
Author Abhishek Hingnikar , Yvonne Wilson
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and t....
Release Date 2019/12 -
A concise introduction to the NIS Directive - A pocket guide for digital service providers
Author Alan Calder
This pocket guide is an introduction to the EU’s NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENIS....
Release Date 2018/11 -
Author Adolfo Eloy Nascimento
Efficiently integrate OAuth 2.0 to protect your mobile, desktop, Cloud applications and APIs using Spring Security technologies.About This BookInteract with public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google.Use Spring Security and Spring Securit....
Release Date 2017/10 -
Author Justin Richer Antonio Sanso
SummaryOAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You’ll learn how to confidently and securely build and deploy OAuth on both the client an....
Release Date 2017/03 -
Author Charles Bihis
Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization FrameworkAbout This BookLearn how to use the OAuth 2.0 protocol to interact with the world's most popular ....
Release Date 2015/12 -
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
Author Prabath Siriwardena
AdvancedAPI Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs.API adoption in both consumer and enterprises has gone beyond predictions. It has become the ‘coolest’ way of exposing business func....
Release Date 2014/08