Anbieter: HPB-Red, Dallas, TX, USA
Paperback. Zustand: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 16,35
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 311 pages. 9.75x6.75x0.75 inches. In Stock.
Anbieter: PAPER CAVALIER US, Brooklyn, NY, USA
Zustand: very good. Gently used. May include previous owner's signature or bookplate on the front endpaper, sticker on back and/or remainder mark on text block.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. Brand New. Soft Cover International Edition. Different ISBN and Cover Image. Priced lower than the standard editions which is usually intended to make them more affordable for students abroad. The core content of the book is generally the same as the standard edition. The country selling restrictions may be printed on the book but is no problem for the self-use. This Item maybe shipped from US or any other country as we have multiple locations worldwide.
Anbieter: GreatBookPrices, Columbia, MD, USA
EUR 40,63
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: Lakeside Books, Benton Harbor, MI, USA
EUR 39,46
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!
Anbieter: GreatBookPrices, Columbia, MD, USA
EUR 45,52
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Anbieter: California Books, Miami, FL, USA
EUR 48,29
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
EUR 56,63
Anzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback. Zustand: New. 2nd ed. Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.This expanded editionhas been revised to provide an overview of the new version of OAuth (2.1)?the primary changes in this version, including features that were removed from 2.1 that were in 2.0 and why they were removed. The discussion of the book's accompanying sample application has been revised to cover in more depth the approach for developing the application (also revised). A new section has been added on the OAuth 2.0 Device Authorization Grant (RFC 8628) specification, which is useful for devices with limited UI capability. Minor additions include the topics of identity proofing, the need to capture and organize consent information, the impact of tracking prevention technology on certain identity protocols, and the availability of additional options for authorization requests such as OAuth 2.0 Rich Authorization Requests and JWT-Secured Authorization Requests (RFC 9101).What You'll Learn.Understand key identity management concepts.Incorporate essential design principles.Design authentication and access control for a modern application.Know the identity management frameworks and protocols used today (OIDC/OAuth 2.0/2.1, SAML 2.0).Review historical failures and know how to avoid themWho This Book Is ForDevelopers, enterprise or application architects, business application or product owners, and anyone involved in an application's identity management solution.
Anbieter: Books Puddle, New York, NY, USA
Zustand: New.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 58,10
Anzahl: 1 verfügbar
In den WarenkorbZustand: New.
Anbieter: Rarewaves.com USA, London, LONDO, Vereinigtes Königreich
EUR 68,73
Anzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback. Zustand: New. Second Edition. Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.This expanded editionhas been revised to provide an overview of the new version of OAuth (2.1)?the primary changes in this version, including features that were removed from 2.1 that were in 2.0 and why they were removed. The discussion of the book's accompanying sample application has been revised to cover in more depth the approach for developing the application (also revised). A new section has been added on the OAuth 2.0 Device Authorization Grant (RFC 8628) specification, which is useful for devices with limited UI capability. Minor additions include the topics of identity proofing, the need to capture and organize consent information, the impact of tracking prevention technology on certain identity protocols, and the availability of additional options for authorization requests such as OAuth 2.0 Rich Authorization Requests and JWT-Secured Authorization Requests (RFC 9101).What You'll Learn.Understand key identity management concepts.Incorporate essential design principles.Design authentication and access control for a modern application.Know the identity management frameworks and protocols used today (OIDC/OAuth 2.0/2.1, SAML 2.0).Review historical failures and know how to avoid themWho This Book Is ForDevelopers, enterprise or application architects, business application or product owners, and anyone involved in an application's identity management solution.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 51,78
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 56,24
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 52,83
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New.
ISBN 10: 1484294173 ISBN 13: 9781484294178
Anbieter: SMASS Sellers, IRVING, TX, USA
Zustand: New. Brand New, Softcover edition. This item may ship from the US or our Overseas warehouse depending on your location and stock availability.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 66,84
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 2nd edition. 412 pages. 10.00x7.01x0.85 inches. In Stock.
EUR 58,04
Anzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback. Zustand: New. Second Edition. Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.This expanded editionhas been revised to provide an overview of the new version of OAuth (2.1)?the primary changes in this version, including features that were removed from 2.1 that were in 2.0 and why they were removed. The discussion of the book's accompanying sample application has been revised to cover in more depth the approach for developing the application (also revised). A new section has been added on the OAuth 2.0 Device Authorization Grant (RFC 8628) specification, which is useful for devices with limited UI capability. Minor additions include the topics of identity proofing, the need to capture and organize consent information, the impact of tracking prevention technology on certain identity protocols, and the availability of additional options for authorization requests such as OAuth 2.0 Rich Authorization Requests and JWT-Secured Authorization Requests (RFC 9101).What You'll Learn.Understand key identity management concepts.Incorporate essential design principles.Design authentication and access control for a modern application.Know the identity management frameworks and protocols used today (OIDC/OAuth 2.0/2.1, SAML 2.0).Review historical failures and know how to avoid themWho This Book Is ForDevelopers, enterprise or application architects, business application or product owners, and anyone involved in an application's identity management solution.
Zustand: New. Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity .
Anbieter: Rarewaves.com UK, London, Vereinigtes Königreich
EUR 61,49
Anzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback. Zustand: New. Second Edition. Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.This expanded editionhas been revised to provide an overview of the new version of OAuth (2.1)?the primary changes in this version, including features that were removed from 2.1 that were in 2.0 and why they were removed. The discussion of the book's accompanying sample application has been revised to cover in more depth the approach for developing the application (also revised). A new section has been added on the OAuth 2.0 Device Authorization Grant (RFC 8628) specification, which is useful for devices with limited UI capability. Minor additions include the topics of identity proofing, the need to capture and organize consent information, the impact of tracking prevention technology on certain identity protocols, and the availability of additional options for authorization requests such as OAuth 2.0 Rich Authorization Requests and JWT-Secured Authorization Requests (RFC 9101).What You'll Learn.Understand key identity management concepts.Incorporate essential design principles.Design authentication and access control for a modern application.Know the identity management frameworks and protocols used today (OIDC/OAuth 2.0/2.1, SAML 2.0).Review historical failures and know how to avoid themWho This Book Is ForDevelopers, enterprise or application architects, business application or product owners, and anyone involved in an application's identity management solution.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 72,09
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 2nd edition. 412 pages. 10.00x7.01x0.85 inches. In Stock. This item is printed on demand.