Packt Publishing, 2015. — 238 p.
OAuth 2.0 is a powerful authentication and authorization framework that has been adopted as a standard in the technical community. Proper use of this protocol will enable your application to interact with the world's most popular service providers, allowing you to leverage their world-class technologies in your own application. Want to log your...
O’Reilly, 2012. — 80 p. — ISBN13: 978-1-449-31160-5. Целевая аудитория: опытные разработчики. Сегодня авторизация в приложении не занимает большого времени у разработчика, ведь сторонние сервисы вроде Google, Github, Facebook и другие предоставляют собственный API для авторизации. В этом небольшом руководстве вы познакомитесь с популярный протоколом OAuth2 и основами работы с...
O’Reilly, 2012. — 80 p. — ISBN13: 978-1-449-31160-5. Целевая аудитория: опытные разработчики. Сегодня авторизация в приложении не занимает большого времени у разработчика, ведь сторонние сервисы вроде Google, Github, Facebook и другие предоставляют собственный API для авторизации. В этом небольшом руководстве вы познакомитесь с популярный протоколом OAuth2 и основами работы с...
PHP[architect], 2016. — 114 p. — ISBN10: 1940111269. — ISBN13: 978-1940111261 Modern web applications are no longer standalone, monolithic codebases. Instead, they are expected to integrate with external, 3rd party applications to allow users to tap into new features, integrate with their social networks, and to easily migrate their data between systems. Many services afford...
PHP[architect], 2016. — 100 p. — ISBN10: 1940111269. — ISBN13: 978-1940111261 Modern web applications are no longer standalone, monolithic codebases. Instead, they are expected to integrate with external, 3rd party applications to allow users to tap into new features, integrate with their social networks, and to easily migrate their data between systems. Many services afford...
PHP[architect], 2016. — 118 p. — ISBN10: 1940111269. — ISBN13: 978-1940111261 Modern web applications are no longer standalone, monolithic codebases. Instead, they are expected to integrate with external, 3rd party applications to allow users to tap into new features, integrate with their social networks, and to easily migrate their data between systems. Many services afford...
Packt Publishing, 2017. — 420 p. — ISBN: 178829596X. OAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and so on. This book also provides useful recipes for solving real-life problems using Spring Security and creating Android...
Packt Publishing, 2017. — 420 p. — ISBN: 178829596X. OAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and so on. This book also provides useful recipes for solving real-life problems using Spring Security and creating Android...
Packt Publishing, 2017. — 420 p. — ISBN: 178829596X. OAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and so on. This book also provides useful recipes for solving real-life problems using Spring Security and creating Android...
Manning Publications, 2017. — 360 p. — ISBN: 9781617293276. OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer.
2nd edition. — Apress, 2020. — 455 p. — ISBN13: 978-1-4842-2049-8. Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of...
2nd edition. — Apress, 2020. — 396 p. — ISBN13: (electronic): 978-1-4842-2050-4. Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a...
2nd edition. — Apress, 2020. — 396 p. — ISBN13: (electronic): 978-1-4842-2050-4. Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a...
2nd edition. — Apress, 2020. — 396 p. — ISBN13: (electronic): 978-1-4842-2050-4. Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a...
Packt Publishing, 2013. — 128 p. — ISBN: 9781783285594. OAuth 2.0 has become the most widely used authorization framework. It provides an easy-to-use sign-in mechanism and allows users to quickly and efficiently secure service APIs. It also provides a protection layer for assets so that various third-party applications cannot have direct access to them. From service providers...
Packt Publishing, 2013. — 128 p. — ISBN: 9781783285594. OAuth 2.0 has become the most widely used authorization framework. It provides an easy-to-use sign-in mechanism and allows users to quickly and efficiently secure service APIs. It also provides a protection layer for assets so that various third-party applications cannot have direct access to them. From service providers...
Комментарии