Search Results for "oauth-2-in-action"

Oauth 2 in Action

Oauth 2 in Action

  • Author: Justin Richer,Antonio Sanso
  • Publisher: Manning Publications
  • ISBN: 9781617293276
  • Category: Computers
  • Page: 375
  • View: 3489
DOWNLOAD NOW »
OAuth 2 is like the web version of a valet key. Instead of unsafe password-sharing, OAuth offers a much more secure delegation protocol. OAuth is used everywhere, from large providers like Facebook and Google, to small APIs at startups, and even cloud services, it's the worldwide standard. OAuth 2 is the must-know security protocol on the web today. "OAuth 2 in Action" teaches practical use and deployment of this protocol from the perspective of a client, authorization server, and resource server. It begins with an overview of OAuth and a look at its components and interactions. Using hands-on examples, it shows how to build a first OAuth client, followed by an authorization server, and then a protected resource. The second part of the book dives into crucial implementation vulnerability, and more advanced topics. By the end of this book, anyone will be able to build and deploy applications that use OAuth on both the client and server sides. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

Mastering OAuth 2.0

Mastering OAuth 2.0

  • Author: Charles Bihis
  • Publisher: Packt Publishing Ltd
  • ISBN: 1784392308
  • Category: Computers
  • Page: 238
  • View: 5736
DOWNLOAD NOW »
Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework About This Book Learn how to use the OAuth 2.0 protocol to interact with the world's most popular service providers, such as Facebook, Google, Instagram, Slack, Box, and more Master the finer details of this complex protocol to maximize the potential of your application while maintaining the utmost of security Step through the construction of a real-world working application that logs you in with your Facebook account to create a compelling infographic about the most important person in the world—you! Who This Book Is For If you are an application developer, software architect, security engineer, or even a casual programmer looking to leverage the power of OAuth, Mastering OAuth 2.0 is for you. Covering basic topics such as registering your application and choosing an appropriate workflow, to advanced topics such as security considerations and extensions to the specification, this book has something for everyone. A basic knowledge of programming and OAuth is recommended. What You Will Learn Discover the power and prevalence of OAuth 2.0 and use it to improve your application's capabilities Step through the process of creating a real-world application that interacts with Facebook using OAuth 2.0 Examine the various workflows described by the specification, looking at what they are and when to use them Learn about the many security considerations involved with creating an application that interacts with other service providers Develop your debugging skills with dedicated pages for tooling and troubleshooting Build your own rich, powerful applications by leveraging world-class technologies from companies around the world In Detail OAuth 2.0 is a powerful authentication and authorization framework that has been adopted as a standard in the technical community. Proper use of this protocol will enable your application to interact with the world's most popular service providers, allowing you to leverage their world-class technologies in your own application. Want to log your user in to your application with their Facebook account? Want to display an interactive Google Map in your application? How about posting an update to your user's LinkedIn feed? This is all achievable through the power of OAuth. With a focus on practicality and security, this book takes a detailed and hands-on approach to explaining the protocol, highlighting important pieces of information along the way. At the beginning, you will learn what OAuth is, how it works at a high level, and the steps involved in creating an application. After obtaining an overview of OAuth, you will move on to the second part of the book where you will learn the need for and importance of registering your application and types of supported workflows. You will discover more about the access token, how you can use it with your application, and how to refresh it after expiration. By the end of the book, you will know how to make your application architecture robust. You will explore the security considerations and effective methods to debug your applications using appropriate tools. You will also have a look at special considerations to integrate with OAuth service providers via native mobile applications. In addition, you will also come across support resources for OAuth and credentials grant. Style and approach With a focus on practicality and security, Mastering OAuth 2.0 takes a top-down approach at exploring the protocol. Discussed first at a high level, examining the importance and overall structure of the protocol, the book then dives into each subject, adding more depth as we proceed. This all culminates in an example application that will be built, step by step, using the valuable and practical knowledge you have gained.

OAuth 2.0 Cookbook

OAuth 2.0 Cookbook

Protect your web applications using Spring Security

  • Author: Adolfo Eloy Nascimento
  • Publisher: Packt Publishing Ltd
  • ISBN: 1788290631
  • Category: Computers
  • Page: 420
  • View: 2392
DOWNLOAD NOW »
Efficiently integrate OAuth 2.0 to protect your mobile, desktop, Cloud applications and APIs using Spring Security technologies. About This Book Interact with public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google. Use Spring Security and Spring Security OAuth2 to implement your own OAuth 2.0 provider Learn how to implement OAuth 2.0 native mobile clients for Android applications Who This Book Is For This book targets software engineers and security experts who are looking to develop their skills in API security and OAuth 2.0. Prior programming knowledge and a basic understanding of developing web applications are necessary. As this book's recipes mostly use Spring Security and Spring Security OAuth2, some prior experience with Spring Framework will be helpful. What You Will Learn Use Redis and relational databases to store issued access tokens and refresh tokens Access resources protected by the OAuth2 Provider using Spring Security Implement a web application that dynamically registers itself to the Authorization Server Improve the safety of your mobile client using dynamic client registration Protect your Android client with Proof Key for Code Exchange Protect the Authorization Server from COMPUTERS / Cloud Computing redirection In Detail OAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and so on. This book also provides useful recipes for solving real-life problems using Spring Security and creating Android applications. The book starts by presenting you how to interact with some public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google. You will also be able to implement your own OAuth 2.0 provider with Spring Security OAuth2. Next, the book will cover practical scenarios regarding some important OAuth 2.0 profiles such as Dynamic Client Registration, Token Introspection and how to revoke issued access tokens. You will then be introduced to the usage of JWT, OpenID Connect, and how to safely implement native mobile OAuth 2.0 Clients. By the end of this book, you will be able to ensure that both the server and client are protected against common vulnerabilities. Style and approach With the help of real-world examples, this book provides step by step recipes for troubleshooting and extending your API security. The book also helps you with accessing and securing data on mobile, desktop, and cloud apps with OAuth 2.0.

Getting Started with OAuth 2.0

Getting Started with OAuth 2.0

Programming Clients for Secure Web API Authorization and Authentication

  • Author: Ryan Boyd
  • Publisher: "O'Reilly Media, Inc."
  • ISBN: 1449331610
  • Category: Computers
  • Page: 82
  • View: 1725
DOWNLOAD NOW »
Whether you develop web applications or mobile apps, the OAuth 2.0 protocol will save a lot of headaches. This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data—such as user profiles, photos, videos, and contact lists—to improve their experience of your application. Through code examples, step-by-step instructions, and use-case examples, you’ll learn how to apply OAuth 2.0 to your server-side web application, client-side app, or mobile app. Find out what it takes to access social graphs, store data in a user’s online filesystem, and perform many other tasks. Understand OAuth 2.0’s role in authentication and authorization Learn how OAuth’s Authorization Code flow helps you integrate data from different business applications Discover why native mobile apps use OAuth differently than mobile web apps Use OpenID Connect and eliminate the need to build your own authentication system

Advanced API Security

Advanced API Security

Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE

  • Author: Prabath Siriwardena
  • Publisher: Apress
  • ISBN: 1430268174
  • Category: Computers
  • Page: 260
  • View: 1197
DOWNLOAD NOW »
Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. API adoption in both consumer and enterprises has gone beyond predictions. It has become the ‘coolest’ way of exposing business functionalities to the outside world. Both your public and private APIs, need to be protected, monitored and managed. Security is not an afterthought, but API security has evolved a lot in last five years. The growth of standards, out there, has been exponential. That's where AdvancedAPI Security comes in--to wade through the weeds and help you keep the bad guys away while realizing the internal and external benefits of developing APIs for your services. Our expert author guides you through the maze of options and shares industry leading best practices in designing APIs for rock-solid security. The book will explain, in depth, securing APIs from quite traditional HTTP Basic Authentication to OAuth 2.0 and the standards built around it. Build APIs with rock-solid security today with Advanced API Security. Takes you through the best practices in designing APIs for rock-solid security. Provides an in depth tutorial of most widely adopted security standards for API security. Teaches you how to compare and contrast different security standards/protocols to find out what suits your business needs the best.

OAuth 2.0 Simplified

OAuth 2.0 Simplified

  • Author: Aaron Parecki
  • Publisher: Lulu Press, Inc
  • ISBN: 1387303805
  • Category: Computers
  • Page: N.A
  • View: 5074
DOWNLOAD NOW »
The OAuth 2.0 authorization framework has become the industry standard in providing secure access to web APIs. It allows users to grant external applications access to their data, such as profile data, photos, and email, without compromising security. OAuth 2.0 Simplified is a guide to building an OAuth 2.0 server. Through high-level overviews, step-by-step instructions, and real-world examples, you will learn how to take advantage of the OAuth 2.0 framework while building a secure API.

OAuth

OAuth

Getting Started in Web-API Security

  • Author: Matthias Biehl
  • Publisher: Matthias Biehl
  • ISBN: N.A
  • Category: Computers
  • Page: 44
  • View: 9439
DOWNLOAD NOW »
This book offers an introduction to web-API security with OAuth 2.0 and OpenID Connect. In less than 50 pages you will gain an overview of the capabilities of OAuth. You will learn the core concepts of OAuth. You will get to know all four OAuth flows that are used in cloud solutions and mobile apps. If you have tried to read the official OAuth specification, you may get the impression that OAuth is complex. This book explains OAuth in simple terms. The different OAuth flows are visualized graphically using sequence diagrams. The diagrams allow you to see the big picture of the various OAuth interactions. This high-level overview is complemented with rich set of example requests and responses and an explanation of the technical details. In the book the challenges and benefits of OAuth are presented, followed by an explanation of the technical concepts of OAuth. The technical concepts include the actors, endpoints, tokens and the four OAuth flows. Each flow is described in detail, including the use cases for each flow. Extensions of OAuth are presented, such as OpenID Connect and the SAML2 Bearer Profile. Who should read this book? You do not have the time to read long books? This book provides an overview, the core concepts, without getting lost in the small-small details. This book provides all the necessary information to get started with OAuth in less than 50 pages. You believe OAuth is complicated? OAuth may seem complex with flows and redirects going back and forth. This book will give you clarity by introducing the seemingly complicated material by many illustrations. These illustrations clearly show all the involved interaction parties and the messages they exchange. You want to learn the OAuth concepts efficiently? This book uses many illustrations and sequence diagrams. A good diagram says more than 1000 words. You want to learn the difference between OAuth and OpenID Connect? You wonder when the two concepts are used, what they have in common and what is different between them. This book will help you answer this question. You want to use OAuth in your mobile app? If you want to access resources that are protected by OAuth, you need to get a token first, before you can access the resource. For this, you need to understand the OAuth flows and the dependencies between the steps of the flows. You want to use OAuth to protect your APIs? OAuth is perfectly suited to protect your APIs. You can learn which OAuth endpoints need to be provided and which checks need to be made within the protected APIs.

Federated Identity Primer

Federated Identity Primer

  • Author: Derrick Rountree
  • Publisher: Newnes
  • ISBN: 0124072070
  • Category: Computers
  • Page: 96
  • View: 591
DOWNLOAD NOW »
Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In Federated Identity Primer, Derrick Rountree. Learn about Internet authentication Learn about federated authentication Learn about ADFS 2.0

Identity and Data Security for Web Development

Identity and Data Security for Web Development

Best Practices

  • Author: Jonathan LeBlanc,Tim Messerschmidt
  • Publisher: "O'Reilly Media, Inc."
  • ISBN: 1491936967
  • Category: Computers
  • Page: 204
  • View: 1191
DOWNLOAD NOW »
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how and why everyone working on a system needs to ensure that users and data are protected. Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity—without compromising usability. You’ll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure. Understand the state of web and application security today Design security password encryption, and combat password attack vectors Create digital fingerprints to identify users through browser, device, and paired device detection Build secure data transmission systems through OAuth and OpenID Connect Use alternate methods of identification for a second factor of authentication Harden your web applications against attack Create a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography

Designing Evolvable Web APIs with ASP.NET

Designing Evolvable Web APIs with ASP.NET

  • Author: Glenn Block,Pablo Cibraro,Pedro Felix,Howard Dierking,Darrel Miller
  • Publisher: "O'Reilly Media, Inc."
  • ISBN: 1449337902
  • Category: COMPUTERS
  • Page: 538
  • View: 4028
DOWNLOAD NOW »
Design and build Web APIs for a broad range of clients—including browsers and mobile devices—that can adapt to change over time. This practical, hands-on guide takes you through the theory and tools you need to build evolvable HTTP services with Microsoft’s ASP.NET Web API framework. In the process, you’ll learn how design and implement a real-world Web API. Ideal for experienced .NET developers, this book’s sections on basic Web API theory and design also apply to developers who work with other development stacks such as Java, Ruby, PHP, and Node. Dig into HTTP essentials, as well as API development concepts and styles Learn ASP.NET Web API fundamentals, including the lifecycle of a request as it travels through the framework Design the Issue Tracker API example, exploring topics such as hypermedia support with collection+json Use behavioral-driven development with ASP.NET Web API to implement and enhance the application Explore techniques for building clients that are resilient to change, and make it easy to consume hypermedia APIs Get a comprehensive reference on how ASP.NET Web API works under the hood, including security and testability

Mechanics of User Identification and Authentication

Mechanics of User Identification and Authentication

Fundamentals of Identity Management

  • Author: Dobromir Todorov
  • Publisher: CRC Press
  • ISBN: 9781420052206
  • Category: Computers
  • Page: 760
  • View: 8923
DOWNLOAD NOW »
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts of selecting one authentication mechanism or another? Introducing key concepts, Mechanics of User Identification and Authentication: Fundamentals of Identity Management outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth, yet accessible manner. It examines today's security landscape and the specific threats to user authentication. The book then outlines the process of controlled access to resources and discusses the types of user credentials that can be presented as proof of identity prior to accessing a computer system. It also contains an overview on cryptography that includes the essential approaches and terms required for understanding how user authentication works. This book provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is illustrated with a specific authentication scenario.

Rails 4 in Action

Rails 4 in Action

  • Author: Ryan Bigg,Yehuda Katz,Rebecca Skinner,Steve Klabnik
  • Publisher: Manning Publications Company
  • ISBN: 9781617291098
  • Category: Computers
  • Page: 576
  • View: 2933
DOWNLOAD NOW »
Summary Rails 4 in Action is a comprehensive introduction to Rails that guides you hands-on through all you'll need to become a competent and confident Rails developer. In it, you'll master Rails 4 by developing a ticket-tracking application that includes RESTful routing, authentication and authorization, file uploads, email, and more. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the Book Rails is a full-stack, open source web framework powered by Ruby. Now in version 4, Rails is mature and powerful, and to use it effectively you need more than a few Google searches. You'll find no substitute for the guru's-eye-view of design, testing, deployment, and other real-world concerns that this book provides. Rails 4 in Action is a hands-on guide to the subject. In this fully revised new edition, you'll master Rails 4 by developing a ticket-tracking application that includes RESTful routing, authentication and authorization, file uploads, email, and more. Learn to design your own APIs and successfully deploy a production-quality application. You'll see test-driven development and behavior-driven development in action throughout the book, just like in a top Rails shop. What's Inside Creating your own APIs Using RSpec and Capybara Emphasis on test-first development Fully updated for Rails 4 About the Reader For readers of this book, a background in Ruby is helpful but not required. No Rails experience is assumed. About the Authors Ryan Bigg, Yehuda Katz, Steve Klabnik, and Rebecca Skinner are contributors to Rails and active members of the Rails community. Table of Contents Ruby on Rails, the framework Testing saves your bacon Developing a real Rails application Oh, CRUD! Nested resources Authentication Basic access control Fine-grained access control File uploading Tracking state Tagging Sending email Deployment Designing an API Rack-based applications

Developing with Google+

Developing with Google+

Practical Guide to the Google+ Platform

  • Author: Jennifer Murphy
  • Publisher: "O'Reilly Media, Inc."
  • ISBN: 1449357148
  • Category: Computers
  • Page: 104
  • View: 363
DOWNLOAD NOW »
Would you like to integrate Google+ with an existing website, or build your own social application on the platform? Developing with Google+ takes you on a tour of the Google+ APIs, with lots of concrete examples and hands-on projects. You’ll learn how to take advantage of Google+ social plug-ins, communicate programmatically with Google+ over REST APIs, and author real-time Hangout Apps. Over the course of this book, you’ll follow the progress of a fictional company, Baking Disasters, as it incorporates all the features of the Google+ platform. Make the most of social widgets such as the +1 button, Badge, and the Share button Use performance tuning techniques to speed up social plugins on your site Create your own plugins by accessing public data APIs with RESTful web services Transform an blog into a social web application through server-side processing Use OAuth to authenticate users and authorize your access to their private data Extend Google+ Hangouts programmatically and create your own application

Modern Authentication with Azure Active Directory for Web Applications

Modern Authentication with Azure Active Directory for Web Applications

  • Author: Vittorio Bertocci
  • Publisher: Microsoft Press
  • ISBN: 0735698481
  • Category: Computers
  • Page: 336
  • View: 3889
DOWNLOAD NOW »
Build advanced authentication solutions for any cloud or web environment Active Directory has been transformed to reflect the cloud revolution, modern protocols, and today’s newest SaaS paradigms. This is an authoritative, deep-dive guide to building Active Directory authentication solutions for these new environments. Author Vittorio Bertocci drove these technologies from initial concept to general availability, playing key roles in everything from technical design to documentation. In this book, he delivers comprehensive guidance for building complete solutions. For each app type, Bertocci presents high-level scenarios and quick implementation steps, illuminates key concepts in greater depth, and helps you refine your solution to improve performance and reliability. He helps you make sense of highly abstract architectural diagrams and nitty-gritty protocol and implementation details. This is the book for people motivated to become experts. Active Directory Program Manager Vittorio Bertocci shows you how to: Address authentication challenges in the cloud or on-premises Systematically protect apps with Azure AD and AD Federation Services Power sign-in flows with OpenID Connect, Azure AD, and AD libraries Make the most of OpenID Connect’s middleware and supporting classes Work with the Azure AD representation of apps and their relationships Provide fine-grained app access control via roles, groups, and permissions Consume and expose Web APIs protected by Azure AD Understand new authentication protocols without reading complex spec documents

OAuth 2.0: The Definitive Guide

OAuth 2.0: The Definitive Guide

  • Author: Aaron Parecki
  • Publisher: O'Reilly Media, Incorporated
  • ISBN: 9781449319311
  • Category: Computers
  • Page: 400
  • View: 8665
DOWNLOAD NOW »
This is a definitive guide to the OAuth 2 protocol. It covers the latest version of the OAuth 2 core specification (currently the spec is at draft 21 but very little will change between now and the final version). The book will help beginners get started writing client applications to interface with a number of APIs currently using OAuth 2, and will help experts develop and improve their server-side solutions. It is for both developers and engineering managers who want to develop web services with secure APIs, and covers high level overviews as well as details on the security implications of the protocol.

Hands-On Spring Security 5 for Reactive Applications

Hands-On Spring Security 5 for Reactive Applications

Learn effective ways to secure your applications with Spring and Spring WebFlux

  • Author: Tomcy John
  • Publisher: Packt Publishing Ltd
  • ISBN: 1788990072
  • Category: Computers
  • Page: 268
  • View: 3907
DOWNLOAD NOW »
Secure your Java applications by integrating the Spring Security framework in your code Key Features Provide authentication, authorization and other security features for Java applications. Learn how to secure microservices, cloud, and serverless applications easily Understand the code behind the implementation of various security features Book Description Security is one of the most vital concerns for any organization. The complexity of an application is compounded when you need to integrate security with existing code, new technology, and other frameworks. This book will show you how to effectively write Java code that is robust and easy to maintain. Hands-On Spring Security 5 for Reactive Applications starts with the essential concepts of reactive programming, Spring Framework, and Spring Security. You will then learn about a variety of authentication mechanisms and how to integrate them easily with the Spring MVC application. You will also understand how to achieve authorization in a Spring WebFlux application using Spring Security.You will be able to explore the security confgurations required to achieve OAuth2 for securing REST APIs and integrate security in microservices and serverless applications. This book will guide you in integrating add-ons that will add value to any Spring Security module. By the end of the book, you will be proficient at integrating Spring Security in your Java applications What you will learn Understand how Spring Framework and Reactive application programming are connected Implement easy security confgurations with Spring Security expressions Discover the relationship between OAuth2 and OpenID Connect Secure microservices and serverless applications with Spring Integrate add-ons, such as HDIV, Crypto Module, and CORS support Apply Spring Security 5 features to enhance your Java reactive applications Who this book is for If you are a Java developer who wants to improve application security, then this book is for you. A basic understanding of Spring, Spring Security framework, and reactive applications is required to make the most of the book.

Spring Microservices in Action

Spring Microservices in Action

  • Author: John Carnell
  • Publisher: N.A
  • ISBN: 9781617293986
  • Category:
  • Page: 384
  • View: 4720
DOWNLOAD NOW »
Summary Spring Microservices in Action teaches you how to build microservice-based applications using Java and the Spring platform. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Microservices break up your code into small, distributed, and independent services that require careful forethought and design. Fortunately, Spring Boot and Spring Cloud simplify your microservice applications, just as the Spring Framework simplifies enterprise Java development. Spring Boot removes the boilerplate code involved with writing a REST-based service. Spring Cloud provides a suite of tools for the discovery, routing, and deployment of microservices to the enterprise and the cloud. About the Book Spring Microservices in Action teaches you how to build microservice-based applications using Java and the Spring platform. You'll learn to do microservice design as you build and deploy your first Spring Cloud application. Throughout the book, carefully selected real-life examples expose microservice-based patterns for configuring, routing, scaling, and deploying your services. You'll see how Spring's intuitive tooling can help augment and refactor existing applications with micro services. What's Inside Core microservice design principles Managing configuration with Spring Cloud Config Client-side resiliency with Spring, Hystrix, and Ribbon Intelligent routing using Netflix Zuul Deploying Spring Cloud applications About the Reader This book is written for developers with Java and Spring experience. About the Author John Carnell is a senior cloud engineer with twenty years of experience in Java. Table of contents Welcome to the cloud, Spring Building microservices with Spring Boot Controlling your configuration with Spring Cloud configuration server On service discovery When bad things happen: client resiliency patterns with Spring Cloud and Netflix Hystrix Service routing with Spring Cloud and Zuul Securing your microservices Event-driven architecture with Spring Cloud Stream Distributed tracing with Spring Cloud Sleuth and Zipkin Deploying your microservices

Oauth 2.0 Servers

Oauth 2.0 Servers

  • Author: Aaron Parecki
  • Publisher: O'Reilly Media
  • ISBN: 9781491920985
  • Category:
  • Page: 350
  • View: 2918
DOWNLOAD NOW »
The OAuth 2.0 authorization framework has become the industry standard in providing secure access to web APIs. This practical book shows developers step-by-step how implement an OAuth 2.0 API, offering concrete recommendations based on the majority of live implementations to date. You’ll be able to allow users to grant external applications access to your data—such as profile data, photos, and email—without compromising security.

Node.js in Action

Node.js in Action

  • Author: Alex Young,Mike Cantelon,Bradley Meck,Marc Harter,Tim Oxley,T. J. Holowaychuk,Nathan Rajlich
  • Publisher: Manning Publications
  • ISBN: 9781617292576
  • Category: Internet programming
  • Page: 371
  • View: 1194
DOWNLOAD NOW »
Summary Node.js in Action, Second Edition is a thoroughly revised book based on the best-selling first edition. It starts at square one and guides you through all the features, techniques, and concepts you'll need to build production-quality Node applications. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the Technology You already know JavaScript. The trick to mastering Node.js is learning how to build applications that fully exploit its powerful asynchronous event handling and non-blocking I/O features. The Node server radically simplifies event-driven real-time apps like chat, games, and live data analytics, and with its incredibly rich ecosystem of modules, tools, and libraries, it's hard to beat! About the Book Based on the bestselling first edition, Node.js in Action, Second Edition is a completely new book. Packed with practical examples, it teaches you how to create high-performance web servers using JavaScript and Node. You'll master key design concepts such as asynchronous programming, state management, and event-driven programming. And you'll learn to put together MVC servers using Express and Connect, design web APIs, and set up the perfect production environment to build, lint, and test. What's Inside Mastering non-blocking I/O The Node event loop Testing and deploying Web application templating About the Reader Written for web developers with intermediate JavaScript skills. About the Authors The Second Edition author team includes Node masters Alex Young, Bradley Meck, Mike Cantelon, and Tim Oxley, along with original authors Marc Harter, T.J. Holowaychuk, and Nathan Rajlich. Table of contents PART 1 - WELCOME TO NODE Welcome to Node.js Node programming fundamentals What is a Node web application? PART 2 - WEB DEVELOPMENT WITH NODE Front-end build systems Server-side frameworks Connect and Express in depth Web application templating Storing application data Testing Node applications Deploying Node applications and maintaining uptime PART 3 - BEYOND WEB DEVELOPMENT Writing command-line applications Conquering the desktop with Electron

Play Framework Essentials

Play Framework Essentials

  • Author: Julien Richard-Foy
  • Publisher: Packt Publishing Ltd
  • ISBN: 1783982411
  • Category: Computers
  • Page: 200
  • View: 9349
DOWNLOAD NOW »
This book targets Java and Scala developers who already have some experience in web development and who want to master Play framework quickly and efficiently. This book assumes you have a good level of knowledge and understanding of efficient Java and Scala code.