1. 首页
  2. 编程语言
  3. Java
  4. Spring Security 3.1.pdf

Spring Security 3.1.pdf

上传者: 2019-09-27 23:26:53上传 PDF文件 6.34MB 热度 18次
Spring Security 3.1.pdfSpring security 3.1Copyright o 2012 Packt PublishiingAll rights reserved. No part of this book may be reproduced, stored in a retrievalsystem, or transmitted in any form or by any means, without the prior writtenpermission of the publisher, except in the case of brief quotations embedded incritical articles or reviewsrt has been made in the preparation of this book to ensure the accuracyof the information presented. However, the information contained in this book issold without warranty, cither express or implied. Neither the author nor PaclPublishing and its dealers and distributors will be held liable for any damagescaused or alleged to be caused directly or indirectly by this bookPackt Publishing has endeavored to provide trademark information about all of thecompanies and products mentioned in this book by the appropriate use of capitalsHowever, Packt Publishing cannot guarantee the accuracy of this informationFirst published: May 2010Sccond published December 2012Production reference: 1191212Published by Packt Publishing LtdLivery place35 Livery streetBirmingham b3 2PB, UKISBN978-1-84951-826-0www.packtpub.comCoverImagebyasherwishkerman(wishkermanghotmail.comCreditsAuthorsCopyEditorsRobert winchBrandt d'melloPeter mularienInsiya MorbiwalaAlida paivaReviewersami subramanianMarten deinumBrian RelphProject CoordinatorBryan KellyMichelle quadrosAcquisition EditorProofreaderUsha lyerMario cecereLead Technical editoIndexersSusmita PandaMonica AjmeraRekha nairTechnical editorsLubna shaikhGraphicsWorrell lewisAditi GaiiarProduction coordinatorArvindkumar GuptaCover workArvindkumar GuptaAbout the authorRobert winch is currently a Senior Software Engineer at VMware and is theproject lead of the Spring Security framework. In the past, he has worked as aSoftware Architect at Cerner, the largest provider of electronic medical systems inthe U.S. securing health care applications. Throughout his career, he has developedhands on experience integrating Spring Security with an array of security standards(that is, LDAP, SAML, CAS, OAuth, and so on). Before he was employed at Cerner,he worked as an independent web contractor in proteomics research at loyolaUniversity Chicago, and on the Globus Toolkit at Argonne National LaboratoryAcknowledgementBefore we get started I would like to extend my thanks to those who helpedme make this book possible. First, I would like to thank Peter Mularien, forrecommending me to packt Publishing to write the second edition of his bookSecurity 3 packt PublishIt was very useful to have such a soufoundation to start Spring Security 3.1Writing a book is a very involved process and there were many that played a keypart in the book's success. I would like to thank all the members of the team atPackt Publishing for making this possible. to usha lyer for guiding me through theprocess; to Theresa Chettiar, for ensuring that i stayed focused and on time; and toSusmita Panda, for her diligence in reviewing the book. Thank you to my technicalreviewers Peter Mularien, Marten Deinum, Brian Relph, and bryan Kelly. Yourfeedback was critical in ensuring this books successThis book, the Spring Security Framework, and the Spring Framework are all madepossible by the large and active community. Thank you to all of those who contributeto the Spring Framework through patches, JIRA submissions, and answering otheruser's questions. Thanks to Ben alex for creating spring security I'd like to extend myspecial thanks to luke Taylor for his leadership of Spring Security. It was throughmentoring that i have grown into a leader in the Spring Security communityThank you to my friends and family for your continued support. Last, but certainlynot least, I would like to thank my wife, Amanda. Without your love, patience, andencouragement i would have never been able to finish this book. Thank you fortaking such good care of me and reminding me to eatPeter Mularien is an experienced software architect and engineer, and theauthor of the book Spring Security 3, Packt Publishing. Peter currently works for alarge financial services company and has over 1 2 years consulting and productexperience in Java, Spring, Oracle, and many other enterprise technologiesHe is also the reviewer of this bookAbout the reviewersMarten Deinum is a java/ software consultant working for Conspect. Hehas developed and architected software, primarily in Java, for small and largecompanies. He is an enthusiastic open source user and longtime fan user andadvocate of the Spring Framework Ile has held a number of positions includingSoftware Engineer, Development Lead, Coach, and also as a Java and Spring trainerWhen not working or answering questions on the Spring Framework forums, he canbe found in the water training for the triathlon or under the water diving or guidingother people aroundBrian relph is currently a Software Engineer at Google, with a focus on webapplication development In the past, he has worked as a software architect atCerner the largest provider of electronic medical systems in the U.S Throughouthis career, he has developed hands on experience in integrating Spring and SpringSecurity with an array of Java standards(that is, LDAP, CAS, OAuth, and so on), andother open source frameworks(hibernate, Struts, and so on). He has also worked asan independent Web contractor.Bryan Kelly is currently a Software Architect at Cerner Corporationthe largest provider of electronic medical systems in the U.s. At Cerner, hisprimary responsibility is designing and implementing solutions that use theSpring framework, Spring Security, and Hibernate for Web Applications andRESTful Web Services. Previously, he has worked as a Software Developer forCjK Software Consultants. Throughout his career, he has developed hands onexperience in integrating Spring Security with an array of security standards(that is, LDAP, SAML vI and v2, CAS, OAuth, OpenID, and so on)I would like to personally thank rob winch for the opportunity tobe a technical reviewer of this book. I would like to thank my wifeMelinda Kelly for her unwavering support while i used my personaltime to review this book. I would also like to thank John Krzysztowof C]K Software Consultants for giving a high schooler a chance atprofessional software development.Www.Packtpub.comSupport files, eBooks, discount offers and moreYoumightwanttovisitwww.PacktPubcomforsupportfilesanddownloadsrelatedto your bookDid you know that Packt offers e Book versions of every book published, with PDFandepuBfilesavailableyoUcanupgradetotheebookversionatwww.packtpubcom and as a print book customer, you are entitled to a discount on the e book copy.Get in touch with us at serviceopacktpub com for more detailsAtwww.packtpub.comyoucanalsoreadacollectionoffreetechnicalarticlessignup for a range of free newsletters and receive exclusive discounts and offers on Packtbooks and ebooksPIPACKTLIB°http://packtlib.Packtpub.comDo you need instant solutions to your It questions? PacktLib is Packt's onlinedigital book library. Here, you can access, read and search across Packt's entirelibrary of booksWhy Subscribe?Fully searchable across every book published by PacktCopy and paste, print and bookmark contentOn demand and accessible via web browserFree Access for packt account holdersIfyouhaveanaccountwithPacktatwww.Packtpub.comyoucanusethistoaccessPacktlib today and view nine entirely free books. Simply use your login credentialsfor immediate access
用户评论