DEV Community

Yogesh Mali
Yogesh Mali

Posted on • Originally published at

Simplifying Spring Security

Finally, the book is here. Simplifying Spring Security.

Why I wrote this book?

As part of writing this blog, I also follow few communities on Facebook. Most of these communities are related to Spring Framework and Spring Boot. The number of users asks questions related to Spring Security. Hence, I wondered why not write a book about it.

Also as a developer, when I’m writing a Spring Boot application, I often use Spring Security. Accordingly, I always felt like I was using this mysterious library that solves my authentication problems. I wanted to understand the fundamentals and how Spring Security dealt with authentication and authorization.

What do I cover?

In the book, I cover from fundamentals of authentication, authorization, and how to use Spring Security for different authentication flows. Also, I show these flows with examples. As part of the book, you will also get access to a source code repository that you can play with.

In short, I cover the following topics in the book:

  • Introduction
    1. What is Spring Security?
    2. How Spring Security fits in with Spring Boot Application?
    3. Why you need Spring Security?
  • Authentication
    1. What is authentication?
    2. Authentication Architecture
    3. Types of Authentication
    4. Implementation of Different Flows
  • Authorization
    1. What is authorization?
    2. How does Spring Security handle authorization?
    3. What are GrantedAuthorities?
    4. Implementation of Authorization in an application
  • Protection against common exploits
    1. Introduction
    2. Transport Layer Security
    3. Security HTTP Response Headers
    4. Clickjacking Attack
    5. Cross-site Request Forgery Attack (CSRF)
  • Miscellaneous

Simplifying Spring Security
Simplifying Spring Security

Why should you buy this book?

First, it is a technical book and if you are a developer, it will easily help you improve your career. You’ll learn a lot about authentication and can solve some crucial security problems that many applications face.

Most importantly, you can also build your own application and use any of these authentication mechanisms for the application.

Subsequently, if you are getting started for a job in Spring Boot or Spring Framework, the book will also help you in preparing for Spring Security interviews.

Top comments (0)