標題: Titlebook: Pro Spring Security; Carlo Scarioni Book 20131st edition Carlo Scarioni 2013 [打印本頁] 作者: 灰塵 時間: 2025-3-21 18:48
書目名稱Pro Spring Security影響因子(影響力)
書目名稱Pro Spring Security影響因子(影響力)學科排名
書目名稱Pro Spring Security網(wǎng)絡公開度
書目名稱Pro Spring Security網(wǎng)絡公開度學科排名
書目名稱Pro Spring Security被引頻次
書目名稱Pro Spring Security被引頻次學科排名
書目名稱Pro Spring Security年度引用
書目名稱Pro Spring Security年度引用學科排名
書目名稱Pro Spring Security讀者反饋
書目名稱Pro Spring Security讀者反饋學科排名
作者: NEXUS 時間: 2025-3-21 22:13 作者: Audiometry 時間: 2025-3-22 04:24
Securing the Service Layer,This chapter will drill down further into the core functionality of Spring Security.作者: 運動性 時間: 2025-3-22 08:12
Business Object Security with ACLs,This chapter will introduce access control lists (ACLs) in the context of Spring Security.作者: preservative 時間: 2025-3-22 12:47
Integrating Spring Security with Other Frameworks and Languages,This chapter will explore Spring Security in the context of other application frameworks and languages that run on the JVM.作者: minion 時間: 2025-3-22 13:39
Carlo ScarioniThis book aims to be a first, contemporary more pragmatic book on Spring security..We believe there is an opportunity to fill this gap by presenting a more refined work, capable to show the potential 作者: biopsy 時間: 2025-3-22 20:49 作者: intimate 時間: 2025-3-22 21:27
Web Security,ecurity filter chain and the different metadata options at your disposal to define security constraints in your application. I will also cover the Taglib facility for enforcing security constraints at the view level.作者: 冬眠 時間: 2025-3-23 01:22
Configuring Alternative Authentication Providers, the authentication layer, this means that an abstraction exists that takes care of this part of the security process. This abstraction comes in the form, mainly, of the . interface, but it also is supported by specific security Servlet filters and user details services.作者: Aspiration 時間: 2025-3-23 08:42
Customizing and Extending Spring Security,Spring Security—namely, the pluggability of different authentication providers. This chapter covers some other extension points in the framework that you can take advantage of to extend Spring Security’s functionality or to modify or customize functionality that doesn’t work exactly the way you need in your applications.作者: 拋媚眼 時間: 2025-3-23 11:13 作者: 易于出錯 時間: 2025-3-23 16:53
esenting a more refined work, capable to show the potential Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java a作者: 走調(diào) 時間: 2025-3-23 20:03 作者: 顯而易見 時間: 2025-3-24 01:38 作者: 行乞 時間: 2025-3-24 02:47 作者: 細菌等 時間: 2025-3-24 06:31 作者: 數(shù)量 時間: 2025-3-24 13:08 作者: 甜食 時間: 2025-3-24 18:02
Customizing and Extending Spring Security, design practices so that it is open for extension and closed for modification. In the previous chapter, you saw one of the major extension points in Spring Security—namely, the pluggability of different authentication providers. This chapter covers some other extension points in the framework that 作者: 提升 時間: 2025-3-24 19:17 作者: obeisance 時間: 2025-3-25 00:10 作者: Scintillations 時間: 2025-3-25 03:34
Helmut Nees,Friedrich Beuthdevelopment just one step ahead of the next, and updating became critical. In addition, the editors received constructive criticism about the first edition that needed to be addressed. So, while the objective of The Handbook remains intact, the logical evolution of the profession, along with the nee作者: 自作多情 時間: 2025-3-25 08:11
Unterstützung in der Pflegeege. Die Literaturlage weist auf eine hohe Technikakzeptanz der diversen Zielgruppen hin. Aber es fehlen differenzierte Erkenntnisse darüber, ob die Ziele neuer Technologien wie Autonomieerhalt, Teilhabef?rderung u.w.m. erreicht werden. Eine Unterstützung von neuen und assistiven Technologien in der作者: BALK 時間: 2025-3-25 11:56
Blutkrankheiten,tung. Vielfach lagen die früheren di?tetischen Behandlungsversuche der Entwicklung moderner therapeutischer Methoden (Lebertherapie!) zugrunde. Die normale Ern?hrung reicht für die Blutbildung vollkommen aus. Bei Mangelern?hrung nehmen die Erythrozytenzahl, das H?moglobin sowie das Serumeiwei? ab. E作者: 散步 時間: 2025-3-25 18:28
Informed Consent for Laser Therapy in Scar Management,ent can be complex and difficult to explain, may require multiple sessions and have a distinct risk of complications that can be mitigated through good communication, safe practice and appropriate documentation.作者: hematuria 時間: 2025-3-25 20:13
Life in the Rhizospherel for up to a few millimeters. The rhizosphere can be divided into the rhizoplane (i.e., the root surface), the endorhizosphere (i.e., the internal root parts) and the ectorhizosphere (in this chapter experimentally defined as the thin layer of sand or soil adhering to the roots). The term rhizosphe作者: Exterior 時間: 2025-3-26 03:51 作者: 脊椎動物 時間: 2025-3-26 06:41 作者: electrolyte 時間: 2025-3-26 08:30
Some Theory on Non-negative Tucker Decomposition guarantee the non-negative core to have low non-negative rank requires identifying on each mode a cone with possibly a very large number of extreme rays. To illustrate our observations, some existing algorithms that compute the non-negative Tucker decomposition are described and tested on synthetic data.作者: Vaginismus 時間: 2025-3-26 15:29
Exploitation of a Rough Approximation of the Outranking Relation in Multicriteria Choice and Rankingg relation on set M. The construction of a suitable exploitation procedure in order to obtain a recommendation for multicriteria choice and ranking is an open problem within this context. We propose an exploitation procedure that it is the only one satisfying some desirable properties.作者: BOOM 時間: 2025-3-26 17:35 作者: indenture 時間: 2025-3-26 21:55 作者: 忘川河 時間: 2025-3-27 01:34
Internet of Things and Ubiquitous Computing in the Tourism Domain,ets for a more immersive experience, personalized souvenirs and smart gadgets, stationary information kiosks that automatically identify their users, mobile applications that are aware of which products, and places the tourist has already been in contact with. This chapter provides an overview of th作者: 長矛 時間: 2025-3-27 07:46
Die Auswirkungen von Selbstbehauptung und genitaler Bewu?theit auf das auftauchende Selbstsch, den Explorationsbereich und die Spielkontakte mit Kindern und anderen Erwachsenen auszubauen. Dieser unvers?hnliche Gegensatz führt zu etwas, was das Kleinkind m?glicherweise als unerkl?rliche Frustration erlebt.作者: 大炮 時間: 2025-3-27 09:48
,Die Informationstechnik und unternehmensübergreifende Logistik,o sehr im Rahmen der Unternehmung abspielenden Prozesse bringt es mit sich, da? das gesamte Informationsversorgungsniveau auf eine h?here Ebene gehoben wird und da? die damit verbundenen Ansprüche stark steigen.作者: 構(gòu)成 時間: 2025-3-27 16:18 作者: inquisitive 時間: 2025-3-27 21:08
Book 2005ch ausgepr?gt ist und ihr relativer Schulmisserfolg stabil bleibt. Fatalerweise wird nun dieses Versagen der betroffenen Kinder beschrieben - nicht aber das Versagen des Systems, das solches Schulversagen nicht zu verhindern wei?. In den Beitr?gen des hochaktuellen Sammelbandes werden die Bedingunge