Troubleshooting Java, Second Edition introduces code investigation techniques that will help you efficiently understand how Java apps work, how to optimize them, and how to fix the bugs that break them. In it, you’ll learn timesaving practices for discovering hidden dependencies, discovering the root causes of crashes, and interpreting unexpected results. Explore debugging tools like IntelliJ IDEA Debugger, JConsole, and Heap Dump Analyzer; and find new coverage on modern Java, cloud-native Java applications, and microservices. Each technique is explored with a hands-on project, such as debugging a slow REST API, resolving a memory leak in a web app, and tuning for high performance.
Spring Security in Action, Second Edition updates this bestselling guide to Spring Security to include deep coverage of OAuth2/OpenID Connect and security configuration using the new SecurityFilterChain. The crystal clear explanations and relevant examples, teach you how to build your own authorization server, configure secure endpoints, and prevent cross-site scripting and request forgery attacks.
Do you know how to use OAuth2 for authentication and authorization and properly implement internet security?
In this liveProject, you’ll learn to use Spring Security and OAuth 2 to build and secure backend microservices architecture. You’ll step into the role of a developer for health startup HealthX and work hands-on to create a system that can protect your users’ privacy, and scale up as your company grows. Each project in this series covers a different aspect of securing a microservices system, so you can pick the task most relevant to your career.
Precious tips and tricks on how to prepare for Java certification exams.
In real-world systems, services act sometimes as clients for other services. In this liveProject, you’ll implement a Spring Boot service that acts as a client for the OAuth 2 system. You’ll set up needed dependencies, register a client at the authorization server, and implement a proxy that uses the client credentials grant type. Finally, you’ll validate that the full setup works correctly and this mock server can accurately send advice to the health system.
In this liveProject, you’ll implement a gateway service that validates the access tokens and redirects the valid requests to a service-oriented system. You’ll configure the gateway routes and gateway authorization rules, redirecting the requests to the right business logic implementation.
In this liveProject, you will secure the backend of an app to protect users’ data, and design the backend as a resource server in an OAuth 2 system. You’ll configure resource server capabilities to apply endpoint and method authorization rules, and use authenticated principal details in the repository.
In this liveProject, you will implement an authorization server to authenticate users and issue JSON Web Tokens signed with a configured key. You'll use a Spring Boot service to take the role of an authorization server in an OAuth 2 system, set up storage for user and client details, and ensure user details persist in a secure way. Finally, you’ll write and conduct integration tests to make sure your system is secure and bug-free.
How to implement integration testing with Spring Security.
How to avoid mistakes with Spring Security that make your app vulnerable.
How to avoid faults when implementing an OAuth 2 system.
Tips & tricks that every Spring and Java developer should know.
Writing unit and integration tests, and understanding when to use one or the other.
How the evolution of software architecture, implementation, and testing affected Spring.
Troubleshooting Java: Read, debug, and optimize JVM applications presents practical techniques for exploring and repairing unfamiliar code. In it, you’ll learn timesaving practices for discovering hidden dependencies, discovering the root causes of crashes, and interpreting unexpected results. Go beyond profiling and debugging and start understanding how Java applications really work.
Spring Start Here teaches Java developers how to build applications using Spring framework. Informative graphics, relevant examples, and author Laurenţiu Spilcă's clear and lively writing make it easy to pick up the skills you need. You'll discover how to plan, write, and test applications. And by concentrating on the most important features, this no-nonsense book gives you a firm foundation for exploring Spring's rich ecosystem.
Software Security for Developers demystifies complex security protocols, algorithms, and patterns, and demonstrates how to put them into practice in everyday development. This one-stop guide to all major security concepts will teach you how to rapidly debug security-related issues, and put an end to unreliable fixes.
Sample cloud applications help illustrate complex security ideas in a digestible and developer-friendly way. Discover how to use cryptographic algorithms correctly, liberate your users from constant passwords and logins, and make your life easier with prebuilt security from leading cloud key management vaults and services. By the time you’re done, you’ll know everything you need to keep your applications secure and your company’s data safe.
Spring Security in Action shows you how to prevent cross-site scripting and request forgery attacks before they do damage. You’ll start with the basics, simulating password upgrades and adding multiple types of authorization. As your skills grow, you'll adapt Spring Security to new architectures and create advanced OAuth2 configurations. By the time you're done, you'll have a customized Spring Security configuration that protects against threats both common and extraordinary.