X

Buy Products not in the Philippines

Galleon.PH - Discover, Share, Buy!

Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE

Product ID : 18038380


Galleon Product ID 18038380
UPC / ISBN 1430268182
Shipping Weight 1.26 lbs
I think this is wrong?
Binding: Paperback
(see available options)
Model
Manufacturer
Shipping Dimension 9.25 x 7.52 x 0.59 inches
I think this is wrong?
Author Prabath Siriwardena
Edition 1st Ed.
Number Of Pages 260
Publication Date 2014-08-11
Release Date 2014-08-11
-
Save 11%
Before ₱ 6,043
5,406

*Used item/s available.
*Price and Stocks may change without prior notice
  • 3 Day Return Policy
  • All products are genuine and original
  • Cash On Delivery/Cash Upon Pickup Available

Pay with

Description

Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. API adoption in both consumer and enterprises has gone beyond predictions. It has become the ‘coolest’ way of exposing business functionalities to the outside world. Both your public and private APIs, need to be protected, monitored and managed. Security is not an afterthought, but API security has evolved a lot in last five years. The growth of standards, out there, has been exponential. That's where AdvancedAPI Security comes in--to wade through the weeds and help you keep the bad guys away while realizing the internal and external benefits of developing APIs for your services. Our expert author guides you through the maze of options and shares industry leading best practices in designing APIs for rock-solid security. The book will explain, in depth, securing APIs from quite traditional HTTP Basic Authentication to OAuth 2.0 and the standards built around it. Build APIs with rock-solid security today with Advanced API Security.Takes you through the best practices in designing APIs for rock-solid security.Provides an in depth tutorial of most widely adopted security standards for API security.Teaches you how to compare and contrast different security standards/protocols to find out what suits your business needs the best.