Editorial Reviews. About the Author. Robert Winch. Robert Winch is currently a Senior Software Peter Mularien (Author) . Spring Security 3.x Cookbook. Spring Security 3 has 25 ratings and 3 reviews. Marten Deinum said: Spring Security 3 is a pretty decent book if you want to get started with Spring Secu. Peter is an experienced Spring and Spring Security user, and also a regular in the Peter Mularien is currently a senior developer and architect at a mid-sized.
|Published:||27 September 2016|
|PDF File Size:||38.62 Mb|
|ePub File Size:||14.73 Mb|
- * Welcome Peter Mularien (Spring forum at Coderanch)
- Spring Security 3 - Peter Mularien - Google книги
- Spring Security 3
- Similar Threads
- Shopping Cart
You can also refer to his following books: You can also connect with him on the following social media sites: In the past, he has worked as a software architect at Cerner, the largest provider of electronic medical systems in the US, securing healthcare applications.
Before he was employed at Cerner, he worked spring security 3 peter mularien an independent web contractor in proteomics research at Loyola University Chicago and on the Globus Toolkit at Argonne National Laboratory.
Spring Security 3 by Peter Mularien
Peter Mularien is an experienced software architect and engineer and the author of the book Spring Security 3, Packt Publishing. Integrate Spring Security 3 with common external security providers. Packed full with concrete, simple, and concise examples.
Who this book is for This book is for Java developers who build web projects and applications.
Newcomers to Spring Security will still be able to utilize all aspects of this book. What You Will Learn Recognize design flaws that will make your applications unsafe.
Implement basic authorization and credential storage. Move seamlessly from Spring Security 2 to Spring Security 3. Integrate in-house applications and popular Java frameworks with Spring Security 3.
Spring Security has the notion of groups, which is pretty much unmentioned in the reference spring security 3 peter mularien, this book explains it in quite a clear and concise way. Another feature explained quite well is the use of ACL, often asked in the forums and still undocumented in the reference guide.
So this book also fills in those gaps.
So in short if you want to know how Spring Security 3 works internally, what the namespace actually does, how those undocumented features work, this book is a must read.