OAuth 2 in Action

OAuth 2 in Action - Justin Richer

OAuth 2 in Action

DESCRIPTION

OAuth 2 is like the web version of a valet key. Instead of unsafe

password-sharing, OAuth offers a much more secure delegation

protocol. OAuth is used everywhere, from large providers like

Facebook and Google, to small APIs at startups, and even cloud

services, it's the worldwide standard. OAuth 2 is the must-know

security protocol on the web today.



OAuth 2 in Action teaches practical use and deployment of this

protocol from the perspective of a client, authorization server, and

resource server. It begins with an overview of OAuth and a look at its

components and interactions. Using hands-on examples, it shows how

to build a first OAuth client, followed by an authorization server, and

then a protected resource. The second part of the book dives into

crucial implementation vulnerability, and more advanced topics. By

the end of this book, anyone will be able to build and deploy

applications that use OAuth on both the client and server sides.



KEY FEATURES



* Hands-on examples



* Connect with major online services like Google, Facebook,

Twitter



* Takes the reader from beginner to advanced OAuth 2 topics.



AUDIENCE

Citeste mai mult

transport gratuit

319.52Lei

319.52Lei

Primesti 319 puncte

Important icon msg

Primesti puncte de fidelitate dupa fiecare comanda! 100 puncte de fidelitate reprezinta 1 leu. Foloseste-le la viitoarele achizitii!

Livrare in 2-4 saptamani

Descrierea produsului

DESCRIPTION

OAuth 2 is like the web version of a valet key. Instead of unsafe

password-sharing, OAuth offers a much more secure delegation

protocol. OAuth is used everywhere, from large providers like

Facebook and Google, to small APIs at startups, and even cloud

services, it's the worldwide standard. OAuth 2 is the must-know

security protocol on the web today.



OAuth 2 in Action teaches practical use and deployment of this

protocol from the perspective of a client, authorization server, and

resource server. It begins with an overview of OAuth and a look at its

components and interactions. Using hands-on examples, it shows how

to build a first OAuth client, followed by an authorization server, and

then a protected resource. The second part of the book dives into

crucial implementation vulnerability, and more advanced topics. By

the end of this book, anyone will be able to build and deploy

applications that use OAuth on both the client and server sides.



KEY FEATURES



* Hands-on examples



* Connect with major online services like Google, Facebook,

Twitter



* Takes the reader from beginner to advanced OAuth 2 topics.



AUDIENCE

Citeste mai mult

Parerea ta e inspiratie pentru comunitatea Libris!

Istoricul tau de navigare

Noi suntem despre carti, si la fel este si

Newsletter-ul nostru.

Aboneaza-te la vestile literare si primesti un cupon de -10% pentru viitoarea ta comanda!

*Reducerea aplicata prin cupon nu se cumuleaza, ci se aplica reducerea cea mai mare.

Ma abonez image one
Ma abonez image one