Leverage the power of Spring Security 6 to protect your modern Java applications from hackers
Key Features
Architect solutions that leverage Spring Security while remaining loosely coupled
Implement authentication and authorization with SAML2, OAuth 2, hashing, and encryption algorithms
Integrate Spring Security with technologies such as microservices, Kubernetes, the cloud, and GraalVM native images
Book Description
Knowing that experienced hackers are constantly on the prowl to attack your apps can make security one of the most challenging concerns of creating an app. The complexity of properly securing an app is compounded when you must also integrate this factor with legacy code, new technologies, and other frameworks.
Коментарі
Немає коментарів. Будьте першим, хто залишить коментар!
Щоб залишити коментар, будь ласка, увійдіть або зареєструйтесь