Sérénade - ONLINE BOOK OAuth 2 In Action
Sérénade





S’enregistrer S’enregistrer


THIS WILL BE DELETED AFTER CHANGING THE TEMPLATES WITH THE tpl OF THE ZIP
>>> http://www.sendspace.com/file/i4a6tx <<<

Thanks for using this Template
ADC



ONLINE BOOK OAuth 2 In Action

 
Poster un nouveau sujet   Répondre au sujet    Sérénade Index du Forum -> Discussion générale -> Flood

Sujet précédent :: Sujet suivant  
loryela



Hors ligne

Messages: 126
Localisation: Toulouse
 MessagePosté le: Mar 27 Juin - 17:50 (2017)    Sujet du message: ONLINE BOOK OAuth 2 In Action Répondre en citant


OAuth 2 in Action
by Antonio Sanso
rating: 5.0 (5 reviews)


>>>DOWNLOAD BOOK OAuth 2 in Action
>>>ONLINE BOOK OAuth 2 in Action




Summary

OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer.

Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

About the Technology

Think of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services.

About the Book

OAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. By the end, you'll be able to confidently and securely build and deploy OAuth on both the client and server sides.

What's Inside
<p/><ul><li>Covers OAuth 2 protocol and design</li><li>Authorization with OAuth 2</li><li>OpenID Connect and User-Managed Access</li><li>Implementation risks</li><li>JOSE, introspection, revocation, and registration</li><li>Protecting and accessing REST APIs</li></ul>
About the Reader

Readers need basic programming skills and knowledge of HTTP and JSON.

About the Author

Justin Richer is a systems architect and software engineer. Antonio Sanso is a security software engineer and a security researcher. Both authors contribute to open standards and open source.

Table of Contents
<p/><ol><h4>Part 1 - First steps</h4><li>What is OAuth 2.0 and why should you care?</li><li>The OAuth dance </li><h4>Part 2 - Building an OAuth 2 environment</h4><li>Building a simple OAuth client </li><li>Building a simple OAuth protected resource </li><li>Building a simple OAuth authorization server </li><li>OAuth 2.0 in the real world </li><h4>Part 3 - OAuth 2 implementation and vulnerabilities</h4><li>Common client vulnerabilities </li><li>Common protected resources vulnerabilities </li><li>Common authorization server vulnerabilities </li><li>Common OAuth token vulnerabilities </li><h4>Part 4 - Taking OAuth further</h4><li>OAuth tokens </li><li>Dynamic client registration </li><li>User authentication with OAuth 2.0 </li><li>Protocols and profiles using OAuth 2.0 </li><li>Beyond bearer tokens </li><li>Summary and conclusions </li></ol>



Details:
rank: #276,555
price: $39.38
bound: 360 pages
publisher: Manning Publications; 1 edition (March 18, 2017)
lang: English
asin:
isbn: 161729327X, 978-1617293276,
weight: 1.2 pounds (
filesize:




OAuth 2 in Action free macbook read





Generating the ID token 13.6.2International Government Assurance (iGov) 14.3.1Dynamic server discovery and client registration 13.5.4Both authors contribute to open standards and open sourceMapping OAuth to an authentication protocol 13.3About the BookAbout the Author Justin Richer is a systems architect and software engineer

Book Condition: NewABOUT THE TECHNOLOGY This -based security protocol allows the users of a service to enable applications to use that service on their behalf without handing over full controlDesign of a protected resource endpoint 8.2.1OAuth's actors: clients, authorization servers, resource owners, and protected resources 2.4Bookseller Inventory # LIB9781617293276 More Information About This Seller Ask Bookseller a Question Buy New US$ 42.96 Convert Currency Add to Basket Shipping: FREE From United Kingdom to U.S.AAntonio Sanso is a security software engineer and a security researcherYou'll learn how to confidently and securely build and deploy OAuth on both the client and server sidesBeyond Bearer Tokens 15.1Native applications best practices 7.8

Issuing the token and keys 15.3.2Adding refresh token support 5.5Reload to refresh your sessionSummary 4General client security 7.2 171bf2437f



The Limitless Real Estate Leader: Building a Successful Business, Family, and Legacy download epub mobi pdf fb2ONLINE BOOK An American Conscience: The Reinhold Niebuhr StoryDream Stealer: Choose Carefully! (Marc Griffiths) (Volume 1) Marc GriffithsHenry V download epub mobi pdf fb2The English Language Logan Pearsall SmithREAD BOOK Atlantis and The Legendary Blue QueenLe dernier repos de Sarah (Les enqu&ecirc;tes de Tracy Crosswhite t. 1) (French Edition) Robert DugoniAerosol Sky, Book 3 of The Shade Ring Trilogy (Volume 3) download epub mobi pdf fb2ONLINE BOOK El Legado Perdido (Spanish Edition)[PDF] Timestamps: A Collection of Feelings in Time
 
Publicité





 MessagePosté le: Mar 27 Juin - 17:50 (2017)    Sujet du message: Publicité

PublicitéSupprimer les publicités ?
 
Montrer les messages depuis:   
Poster un nouveau sujet   Répondre au sujet    Sérénade Index du Forum -> Flood
Page 1 sur 1

 

Index | créer un forum | Forum gratuit d’entraide | Annuaire des forums gratuits | Signaler une violation | Conditions générales d'utilisation



Google Search
Google



Contact ADC - Ադրիան
Cobalt 2.0 phpBB base template by Jakob Persson.
Copyright © 2002-2004 Jakob Persson


Powered by phpBB © 2001, 2018 phpBB Group
Traduction par : phpBB-fr.com