Pro spring security : (Record no. 222658)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03593cam a22005655i 4500 |
001 - CONTROL NUMBER | |
control field | ssj0002265330 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | WaSeSS |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220427100702.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr n |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 191121s2019 xxu| o |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781484250518 |
Qualifying information | (print) |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-1-4842-5052-5 |
Source of number or code | doi |
040 ## - CATALOGING SOURCE | |
Language of cataloging | eng |
Modifying agency | WaSeSS |
Transcribing agency | AIMIT LIBRARY |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.73.J38 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UMX |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM051280 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UMX |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 006.671 |
Edition number | 2 |
Item number | SCAC |
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC) | |
Classification number | EBOOK |
999 ## - SYSTEM CONTROL NUMBERS (KOHA) | |
Koha Dewey Subclass [OBSOLETE] | 03553383 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Scarioni, Carlo. |
9 (RLIN) | 32220 |
245 10 - TITLE STATEMENT | |
Title | Pro spring security : |
Remainder of title | securing spring framework 5 and boot 2-based java applications / |
Statement of responsibility, etc. | By Carlo Scarioni and Massimo Nardone. |
250 ## - EDITION STATEMENT | |
Edition statement | 2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | New York : |
Name of publisher, distributor, etc. | Apress , |
Date of publication, distribution, etc. | 2022. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xviii,410p. ; |
Dimensions | 25.5 cm. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1. The Scope of Security -- 2. Introducing Spring Security -- 3. Set up the scene -- 4. Spring Security Architecture and Design -- 5. Web Security -- 6. Configuring Alternative Authentication Providers -- 7. Business Objects Security with ACLs -- 8. Customizing and Extending Spring Security -- 9. Integrating Spring Security with Other Frameworks and Languages -- Appendix A: References. |
506 ## - RESTRICTIONS ON ACCESS NOTE | |
Terms governing access | Requires an SPL library card. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security, Second Edition has been updated to incorporate the changes in Spring Framework 5 and Spring Boot 2. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up. This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications. You will: Explore the scope of security and how to use the Spring Security Framework Master Spring security architecture and design Secure the web tier in Spring Work with alternative authentication providers Take advantage of business objects and logic security Extend Spring security with other frameworks and languages Secure the service layer. |
538 ## - SYSTEM DETAILS NOTE | |
System details note | Mode of access: World Wide Web. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Java (Computer program language) |
9 (RLIN) | 32221 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Software engineering |
9 (RLIN) | 32222 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data protection |
9 (RLIN) | 32223 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Configuring alternative authentication providers |
9 (RLIN) | 32224 |
655 #7 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
Source of term | local |
9 (RLIN) | 32225 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Nardone Massimo. |
9 (RLIN) | 32226 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
9 (RLIN) | 32227 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | O'Reilly (Firm) |
9 (RLIN) | 32228 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | Serials Solutions |
9 (RLIN) | 32229 |
773 0# - HOST ITEM ENTRY | |
Title | Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9781484250518 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9781484250532 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Link text | View this electronic item in O'Reilly Online Learning: Academic/Public Library Edition. |
Uniform Resource Identifier | <a href="https://ezproxy.spl.org/login?url=https://learning.oreilly.com/library/view/~/9781484250525/?ar">https://ezproxy.spl.org/login?url=https://learning.oreilly.com/library/view/~/9781484250525/?ar</a> |
Public note | An e-book available through full-text database. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Book |
Edition | 2nd |
Call number prefix | 006.671 SCAC |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Date acquired | Source of acquisition | Cost, normal purchase price | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Cost, replacement price | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | MCA | St Aloysius Institute of Management & Information Technology | St Aloysius Institute of Management & Information Technology | 03/24/2022 | Biblios Book Point | 1599.00 | Bill no:6622; Bill dt:2022-03-23 | 006.671 SCAC | MCA17026 | 07/21/2025 | 1279.20 | 04/27/2022 | Book |