Login       My Wishlist
  My Cart
$0.00 / 0 items
 
Translate This Website
International Translation Network
 
International Access
Global Shipping Options Available
Home About Us News Our Blog Our Catalog My Cart My Account Track Shippment Contact Us
  Our Catalog   Computers & Technology   Security & Encryption

OAuth 2 in Action


Mega Sale! Save 22% on the OAuth 2 in Action by Manning Publications at Translate This Website. MPN: 44801221. Hurry! Limited time offer. Offer valid only while supplies last. Summary OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization


Product Description

Summary

OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer.

Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

About the Technology

Think of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services.

About the Book

OAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. By the end, you'll be able to confidently and securely build and deploy OAuth on both the client and server sides.

What's Inside

  • Covers OAuth 2 protocol and design
  • Authorization with OAuth 2
  • OpenID Connect and User-Managed Access
  • Implementation risks
  • JOSE, introspection, revocation, and registration
  • Protecting and accessing REST APIs

About the Reader

Readers need basic programming skills and knowledge of HTTP and JSON.

About the Author

Justin Richer is a systems architect and software engineer. Antonio Sanso is a security software engineer and a security researcher. Both authors contribute to open standards and open source.

Table of Contents

    Part 1 - First steps

  1. What is OAuth 2.0 and why should you care?
  2. The OAuth dance
  3. Part 2 - Building an OAuth 2 environment

  4. Building a simple OAuth client
  5. Building a simple OAuth protected resource
  6. Building a simple OAuth authorization server
  7. OAuth 2.0 in the real world
  8. Part 3 - OAuth 2 implementation and vulnerabilities

  9. Common client vulnerabilities
  10. Common protected resources vulnerabilities
  11. Common authorization server vulnerabilities
  12. Common OAuth token vulnerabilities
  13. Part 4 - Taking OAuth further

  14. OAuth tokens
  15. Dynamic client registration
  16. User authentication with OAuth 2.0
  17. Protocols and profiles using OAuth 2.0
  18. Beyond bearer tokens
  19. Summary and conclusions

Additional Information

Manufacturer:Manning Publications
Part Number:44801221
Publisher:Manning Publications
Studio:Manning Publications
MPN:44801221
EAN:9781617293276
Item Weight:1.25 pounds
Item Size:0.7 x 9.2 x 9.2 inches
Package Weight:1.25 pounds
Package Size:7.32 x 0.39 x 0.39 inches

OAuth 2 in Action by Manning Publications

Buy Now:
OAuth 2 in Action

Brand: Manning Publications
Condition: New
Lead Time: 1 - 2 Business Days
Availability: In Stock
$49.99
$39.14
You Save: 22%


Quantity:  

 


View More In Security & Encryption.

 


Have questions about this item, or would like to inquire about a custom or bulk order?


If you have any questions about this product by Manning Publications, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.

First Name:
Last Last:
Email Address:
Your Message:

Related Best Sellers


mpn: 36161995, ean: 9781597499576, isbn: 1597499579,
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python...

ean: 9781789130706, isbn: 1789130700,
Discover how to use the next-generation language Red for full-stack development, from systems coding over user-interfaces to blockchain programmingKey FeaturesExplore the latest features of Red to build scalable, fast, and secure applicationsLearn gr...

ean: 9783319937816, isbn: 3319937812,
This book constitutes the refereed proceedings of the 8th Language and Technology Conference: Challenges for Computer Science and Linguistics, LTC 2017, held in Poznan, Poland, in November 2017. The 31 revised papers presented in this volume were car...

mpn: 48227133, ean: 9781593278229, isbn: 1593278225,
Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classica...

mpn: colour illustrations, ean: 9781908043764, isbn: 1908043768,
This is a full-color transcript of a lecture which introduces a pattern language for memory forensics - investigation of past software behaviour in memory snapshots. It provides a unified language for discussing and communicating detection and analys...

ean: 9781788839044, isbn: 1788839048,
Learn about cryptography and cryptocurrencies, so you can build highly secure, decentralized applications and conduct trusted in-app transactions.Key FeaturesGet to grips with the underlying technical principles and implementations of blockchainBuild...

ean: 9781543215090, isbn: 1543215092,
Computer security has become the next battlefield of national defense. Public, private and governmental security is being compromised at an increasing rate. Correspondingly the field of computer security is generating the latest form of defense. This...

ean: 9780833087287, isbn: 0833087282,
This report seeks to help those planning future cyber training by highlighting what can be learned from another specialty: defense language. It examines what the military services and national security agencies have done to meet the need for personne...

ean: 9781119428114, isbn: 1119428114,
Sharpen your knowledge of C#C# know-how is a must if you want to be a professional Microsoft developer. It's also good to know a little C# if you're building tools for the web, mobile apps, or other development tasks. C# 7.0 All-in-One For Dummies of...

ean: 9781545443729, isbn: 1545443726,
3 BOOKS IN 1Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks?Become A Programming Master By Learning These Fundamentals LanguagesTake Your Hacking To The Next Level We have taken our ...



Privacy Policy / Terms of Service
© 2018 - translateth.is. All Rights Reserved.