Learn how to secure your Java applications from hackers using Spring Security 4.2
About This Book
- Architect solutions that leverage the full power of Spring Security while remaining loosely coupled.
- Implement various scenarios such as supporting existing user stores, user sign up, authentication, and supporting AJAX requests,
- Integrate with popular Microservice and Cloud services such as Zookeeper, Eureka, and Consul, along with advanced techniques, including OAuth, JSON Web Token’s (JWS),…