SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

OAuth 2 in Action – Book

Justin Richer, Antonio Sanso

2 min read
in Book, Career, Learning

Summary
OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You’ll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer.
Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
About the Technology
Think of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services.
About the Book
OAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You’ll begin with an overview of OAuth and its components and interactions. Next, you’ll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you’ll dig into tokens, dynamic client registration, and more advanced topics. By the end, you’ll be able to confidently and securely build and deploy OAuth on both the client and server sides.
What’s Inside

  • Covers OAuth 2 protocol and design
  • Authorization with OAuth 2
  • OpenID Connect and User-Managed Access
  • Implementation risks
  • JOSE, introspection, revocation, and registration
  • Protecting and accessing REST APIs

Get Book

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.

Related

Tags: Antonio SansoAPI SecurityAPI Security BooksBooksHTTP-basedJustin RicherLearningOAuth 2 in Action
1
VIEWS
ADVERTISEMENT

Related Posts

Network Forensic Analyst (GNFA)

Network Forensic Analyst (GNFA)

June 29, 2022
Cyber Threat Intelligence (GCTI)

Cyber Threat Intelligence (GCTI)

June 29, 2022
Cyber Threat Intelligence

Cyber Threat Intelligence

June 29, 2022
Threat Hunter

Threat Hunting Professional

June 29, 2022

More Articles

Quotes

“Whether or not a nonprofit collects sensitive data…”

April 25, 2022

ADATA struck by Ragnar Locker ransomware attack

June 9, 2021

In Scope – The Healthcare Security Podcast

April 6, 2022
Document

Top 6 API Security Needs for Serverless Apps

April 21, 2022

“One of the few predictable things about cyber-security…”

April 4, 2021

Personal Data and docs of Swiss town Rolle available on the dark web

August 26, 2021

Hexistor Data Protection Services Podcast

June 17, 2022
Alerts

[Control Systems] Schneider Electric security advisory (AV22-025)

January 14, 2022
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
    • Threats
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....