OAuth 2 in Action
OAuth 2 in Action
OAuth 2 is like the web version of a valet key. Instead of unsafe
password-sharing, OAuth offers a much more secure delegation
protocol. OAuth is used everywhere, from large providers like
Facebook and Google, to small APIs at startups, and even cloud
services, it's the worldwide standard. OAuth 2 is the must-know
security protocol on the web today.
OAuth 2 in Action teaches practical use and deployment of this
protocol from the perspective of a client, authorization server, and
resource server. It begins with an overview of OAuth and a look at its
components and interactions. Using hands-on examples, it shows how
to build a first OAuth client, followed by an authorization server, and
then a protected resource. The second part of the book dives into
crucial implementation vulnerability, and more advanced topics. By
the end of this book, anyone will be able to build and deploy
applications that use OAuth on both the client and server sides.
KEY FEATURES
* Hands-on examples
* Connect with major online services like Google, Facebook,
* Takes the reader from beginner to advanced OAuth 2 topics.
AUDIENCE
PRP: 339.92 Lei
Acesta este Pretul Recomandat de Producator. Pretul de vanzare al produsului este afisat mai jos.
305.93Lei
305.93Lei
339.92 LeiLivrare in 2-4 saptamani
Descrierea produsului
OAuth 2 is like the web version of a valet key. Instead of unsafe
password-sharing, OAuth offers a much more secure delegation
protocol. OAuth is used everywhere, from large providers like
Facebook and Google, to small APIs at startups, and even cloud
services, it's the worldwide standard. OAuth 2 is the must-know
security protocol on the web today.
OAuth 2 in Action teaches practical use and deployment of this
protocol from the perspective of a client, authorization server, and
resource server. It begins with an overview of OAuth and a look at its
components and interactions. Using hands-on examples, it shows how
to build a first OAuth client, followed by an authorization server, and
then a protected resource. The second part of the book dives into
crucial implementation vulnerability, and more advanced topics. By
the end of this book, anyone will be able to build and deploy
applications that use OAuth on both the client and server sides.
KEY FEATURES
* Hands-on examples
* Connect with major online services like Google, Facebook,
* Takes the reader from beginner to advanced OAuth 2 topics.
AUDIENCE
Detaliile produsului
De pe acelasi raft
Acum se comanda
Noi suntem despre carti, si la fel este si
Newsletter-ul nostru.
Aboneaza-te la vestile literare si primesti un cupon de -10% pentru viitoarea ta comanda!
*Reducerea aplicata prin cupon nu se cumuleaza, ci se aplica reducerea cea mai mare.