Advanced API Security, 2nd edition
OAuth 2.0 and Beyond
|Price||$32.99 - $37.78
|Format||Paper book / ebook (PDF)|
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of exploitation. This book teaches you about TLS Token Binding, User Managed Access (UMA) 2.0, Cross Origin Resource Sharing (CORS), Incremental Authorization, Proof Key for Code Exchange (PKCE), and Token Exchange. Benefit from lessons learned from analyzing multiple attacks that have taken place by exploiting security vulnerabilities in various OAuth 2.0 implementations. Explore root causes, and improve your security practices to mitigate against similar future exploits.
Security must be an integral part of any development project. This book shares best practices in designing APIs for rock-solid security. API security has evolved since the first edition of this book, and the growth of standards has been exponential. OAuth 2.0 is the most widely adopted framework that is used as the foundation for standards, and this book shows you how to apply OAuth 2.0 to your own situation in order to secure and protect your enterprise APIs from exploitation and attack.
Securely design, develop, and deploy enterprise APIs; Pick security standards and protocols to match business needs; Mitigate security exploits by understanding the OAuth 2.0 threat landscape; Federate identities to expand business APIs beyond the corporate firewall; Protect microservices at the edge by securing their APIs; Develop native mobile applications to access APIs securely; Integrate applications with SaaS APIs protected with OAuth 2.0
3 5 2
by Prabath Siriwardena
Advanced API Security is a complete reference to the next wave of challenges in enterprise security - securing public and private APIs.API adoption in both consumer and enterprises has gone beyond predictions. It has become the 'coolest' way of exposing business functionalities to the outside world. Both your public and private APIs, need...
Price: $53.56 | Publisher: Apress | Release: 2014
by Chris Snyder, Thomas Myer, Michael Southwell
PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the 2nd edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of J...
Price: $39.99 | Publisher: Apress | Release: 2010
by Matt Bishop
In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles wi...
Price: $94.99 | Publisher: Addison-Wesley | Release: 2018
by Mark Rhodes-Ousley
Today's complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, 2nd Edition is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving thr...
Price: $43.62 | Publisher: McGraw-Hill | Release: 2013
by Apple Computer Inc, James Duncan Davidson
Learning Cocoa with Objective-C is the "must-have" book for people who want to develop applications for Mac OS X, and is the only book approved and reviewed by Apple engineers. Based on the Jaguar release of Mac OS X 10.2, this edition of Learning Cocoa includes examples that use the Address Book and Universal Access API...
Price: $3.50 | Publisher: O'Reilly Media | Release: 2002
by Andrew Lockhart
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The 2nd edition offers both new and thoroughly updated ha...
Price: $31.40 | Publisher: O'Reilly Media | Release: 2006
by Mike Keith, Merrick Schincariol
Pro JPA 2, 2nd Edition introduces, explains, and demonstrates how to use the new Java Persistence API (JPA) 2.1 from the perspective of one of the specification creators. A one-of-a-kind resource, it provides both theoretical and extremely practical coverage of JPA usage for both beginning and advanced developers.Authors Mike Keith and Me...
Price: $50.37 | Publisher: Apress | Release: 2013
by Brian Russell, Drew Van Duren
With the advent of the Internet of Things (IoT),businesses have to defend against new types of threat. The business ecosystem now includes the cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders, and a need to take action quickly based on large q...
Price: $35.90 | Publisher: Packt Publishing | Release: 2018