X

Advanced API Security: OAuth 2.0 and Beyond

Product ID : 20480610


Galleon Product ID 20480610
Model
Manufacturer
Shipping Dimension Unknown Dimensions
I think this is wrong?
-
2,721

*Price and Stocks may change without prior notice
*Packaging of actual item may differ from photo shown

Pay with

About Advanced API Security: OAuth 2.0 And Beyond

Product Description Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of exploitation. This book teaches you about using OAuth 2.0 and related profiles to access APIs securely with web applications, single-page applications, native mobile applications and browser-less applications. Benefit from lessons learned from analyzing multiple attacks that have taken place by exploiting security vulnerabilities in various OAuth 2.0 implementations. Explore root causes, and improve your security practices to mitigate against similar future exploits. Security must be an integral part of any development project. This book shares best practices in designing APIs for better security. API security has evolved since the first edition of this book, and the growth of standards related API security has been exponential. OAuth 2.0 is the most widely adopted framework that is used as the foundation for these standards. This book shows you how to apply OAuth 2.0 to your own situation in order to secure and protect your enterprise APIs from exploitations and attacks. What You Will Learn Securely design, develop, and deploy enterprise APIs Pick security standards and protocols to match business needs Mitigate security exploits by understanding the OAuth 2.0 threat landscape Federate identities to expand business APIs beyond the corporate firewall Protect microservices at the edge by securing their APIs Develop native mobile applications to access APIs securely Integrate applications with SaaS APIs protected with OAuth 2.0 Who This Book Is For Enterprise security architects who are interested in best practices around designing APIs. The book is also for developers who are building enterprise APIs and integrating with internal and external applications.  Review "Looks like a really good book on API security" -  John Musser, Founder, API Science and ProgrammableWeb,  twitter.com/johnmusser/status/503990200708890626 "Mind Blowing..!" -  Steve Degosserie, Co-Founder, mobile Inception,  twitter.com/stiiifff/status/526872050473140224 "Fantastic book. Highly recommended!" -  Paul Fremantle, CTO and Co-Founder, WSO2 Inc,   twitter.com/pzfreo/status/534946965940084736 From the Back Cover Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of exploitation. This book teaches you about using OAuth 2.0 and related profiles to access APIs securely with web applications, single-page applications, native mobile applications and browser-less applications. Benefit from lessons learned from analyzing multiple attacks that have taken place by exploiting security vulnerabilities in various OAuth 2.0 implementations. Explore root causes, and improve your security practices to mitigate against similar future exploits. Security must be an integral part of any development project. This book shares best practices in designing APIs for better security. API security has evolved since the first edition of this book, and the growth of standards related API security has been exponential. OAuth 2.0 is the most widely adopted framework that is used as the foundation for these standards. This book shows you how to apply OAuth 2.0 to your own situation in order to secure and protect your enterprise APIs from exploitations and attacks. You will learn: Securely design, develop, and deploy enterprise APIs Pick security standards and protocols to match business needs Mitigate security exploits by understanding the OAuth 2.0 threat landscape Fede