灰尘 发表于 2025-3-21 18:48:21
书目名称Pro Spring Security影响因子(影响力)<br> http://impactfactor.cn/if/?ISSN=BK0756672<br><br> <br><br>书目名称Pro Spring Security影响因子(影响力)学科排名<br> http://impactfactor.cn/ifr/?ISSN=BK0756672<br><br> <br><br>书目名称Pro Spring Security网络公开度<br> http://impactfactor.cn/at/?ISSN=BK0756672<br><br> <br><br>书目名称Pro Spring Security网络公开度学科排名<br> http://impactfactor.cn/atr/?ISSN=BK0756672<br><br> <br><br>书目名称Pro Spring Security被引频次<br> http://impactfactor.cn/tc/?ISSN=BK0756672<br><br> <br><br>书目名称Pro Spring Security被引频次学科排名<br> http://impactfactor.cn/tcr/?ISSN=BK0756672<br><br> <br><br>书目名称Pro Spring Security年度引用<br> http://impactfactor.cn/ii/?ISSN=BK0756672<br><br> <br><br>书目名称Pro Spring Security年度引用学科排名<br> http://impactfactor.cn/iir/?ISSN=BK0756672<br><br> <br><br>书目名称Pro Spring Security读者反馈<br> http://impactfactor.cn/5y/?ISSN=BK0756672<br><br> <br><br>书目名称Pro Spring Security读者反馈学科排名<br> http://impactfactor.cn/5yr/?ISSN=BK0756672<br><br> <br><br>NEXUS 发表于 2025-3-21 22:13:55
http://reply.papertrans.cn/76/7567/756672/756672_2.pngAudiometry 发表于 2025-3-22 04:24:11
Securing the Service Layer,This chapter will drill down further into the core functionality of Spring Security.运动性 发表于 2025-3-22 08:12:42
Business Object Security with ACLs,This chapter will introduce access control lists (ACLs) in the context of Spring Security.preservative 发表于 2025-3-22 12:47:09
Integrating Spring Security with Other Frameworks and Languages,This chapter will explore Spring Security in the context of other application frameworks and languages that run on the JVM.minion 发表于 2025-3-22 13:39:22
Carlo ScarioniThis book aims to be a first, contemporary more pragmatic book on Spring security..We believe there is an opportunity to fill this gap by presenting a more refined work, capable to show the potentialbiopsy 发表于 2025-3-22 20:49:32
http://reply.papertrans.cn/76/7567/756672/756672_7.pngintimate 发表于 2025-3-22 21:27:44
Web Security,ecurity filter chain and the different metadata options at your disposal to define security constraints in your application. I will also cover the Taglib facility for enforcing security constraints at the view level.冬眠 发表于 2025-3-23 01:22:16
Configuring Alternative Authentication Providers, the authentication layer, this means that an abstraction exists that takes care of this part of the security process. This abstraction comes in the form, mainly, of the . interface, but it also is supported by specific security Servlet filters and user details services.Aspiration 发表于 2025-3-23 08:42:38
Customizing and Extending Spring Security,Spring Security—namely, the pluggability of different authentication providers. This chapter covers some other extension points in the framework that you can take advantage of to extend Spring Security’s functionality or to modify or customize functionality that doesn’t work exactly the way you need in your applications.