語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advanced API security = OAuth 2.0 an...
~
Siriwardena, Prabath.
FindBook
Google Book
Amazon
博客來
Advanced API security = OAuth 2.0 and beyond /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Advanced API security/ by Prabath Siriwardena.
其他題名:
OAuth 2.0 and beyond /
作者:
Siriwardena, Prabath.
出版者:
Berkeley, CA :Apress : : 2020.,
面頁冊數:
xix, 449 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Application software - Security measures. -
電子資源:
https://doi.org/10.1007/978-1-4842-2050-4
ISBN:
9781484220504
Advanced API security = OAuth 2.0 and beyond /
Siriwardena, Prabath.
Advanced API security
OAuth 2.0 and beyond /[electronic resource] :by Prabath Siriwardena. - Second edition. - Berkeley, CA :Apress :2020. - xix, 449 p. :ill., digital ;24 cm.
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of exploitation. This book teaches you about TLS Token Binding, User Managed Access (UMA) 2.0, Cross Origin Resource Sharing (CORS), Incremental Authorization, Proof Key for Code Exchange (PKCE), and Token Exchange. Benefit from lessons learned from analyzing multiple attacks that have taken place by exploiting security vulnerabilities in various OAuth 2.0 implementations. Explore root causes, and improve your security practices to mitigate against similar future exploits. Security must be an integral part of any development project. This book shares best practices in designing APIs for rock-solid security. API security has evolved since the first edition of this book, and the growth of standards has been exponential. OAuth 2.0 is the most widely adopted framework that is used as the foundation for standards, and this book shows you how to apply OAuth 2.0 to your own situation in order to secure and protect your enterprise APIs from exploitation and attack. You will: Securely design, develop, and deploy enterprise APIs Pick security standards and protocols to match business needs Mitigate security exploits by understanding the OAuth 2.0 threat landscape Federate identities to expand business APIs beyond the corporate firewall Protect microservices at the edge by securing their APIs Develop native mobile applications to access APIs securely Integrate applications with SaaS APIs protected with OAuth 2.0.
ISBN: 9781484220504
Standard No.: 10.1007/978-1-4842-2050-4doiSubjects--Topical Terms:
821342
Application software
--Security measures.
LC Class. No.: QA76.76.A65 / S575 2020
Dewey Class. No.: 005.3
Advanced API security = OAuth 2.0 and beyond /
LDR
:02732nmm a2200325 a 4500
001
2215348
003
DE-He213
005
20200603111618.0
006
m d
007
cr nn 008maaau
008
201119s2020 cau s 0 eng d
020
$a
9781484220504
$q
(electronic bk.)
020
$a
9781484220498
$q
(paper)
024
7
$a
10.1007/978-1-4842-2050-4
$2
doi
035
$a
978-1-4842-2050-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.76.A65
$b
S575 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.3
$2
23
090
$a
QA76.76.A65
$b
S619 2020
100
1
$a
Siriwardena, Prabath.
$3
2089221
245
1 0
$a
Advanced API security
$h
[electronic resource] :
$b
OAuth 2.0 and beyond /
$c
by Prabath Siriwardena.
250
$a
Second edition.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2020.
300
$a
xix, 449 p. :
$b
ill., digital ;
$c
24 cm.
520
$a
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of exploitation. This book teaches you about TLS Token Binding, User Managed Access (UMA) 2.0, Cross Origin Resource Sharing (CORS), Incremental Authorization, Proof Key for Code Exchange (PKCE), and Token Exchange. Benefit from lessons learned from analyzing multiple attacks that have taken place by exploiting security vulnerabilities in various OAuth 2.0 implementations. Explore root causes, and improve your security practices to mitigate against similar future exploits. Security must be an integral part of any development project. This book shares best practices in designing APIs for rock-solid security. API security has evolved since the first edition of this book, and the growth of standards has been exponential. OAuth 2.0 is the most widely adopted framework that is used as the foundation for standards, and this book shows you how to apply OAuth 2.0 to your own situation in order to secure and protect your enterprise APIs from exploitation and attack. You will: Securely design, develop, and deploy enterprise APIs Pick security standards and protocols to match business needs Mitigate security exploits by understanding the OAuth 2.0 threat landscape Federate identities to expand business APIs beyond the corporate firewall Protect microservices at the edge by securing their APIs Develop native mobile applications to access APIs securely Integrate applications with SaaS APIs protected with OAuth 2.0.
650
0
$a
Application software
$x
Security measures.
$3
821342
650
1 4
$a
Security.
$3
3134865
650
2 4
$a
Special Purpose and Application-Based Systems.
$3
892492
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Programming Languages, Compilers, Interpreters.
$3
891123
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-1-4842-2050-4
950
$a
Professional and Applied Computing (Springer-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9390256
電子資源
11.線上閱覽_V
電子書
EB QA76.76.A65 S575 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入