144,35 €
160,39 €
-10% with code: EXTRA
Authorization and Access Control
Authorization and Access Control
144,35
160,39 €
  • We will send in 10–14 business days.
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important key concepts are discussed regarding login credentials with restricted access to third parties with a primary account as a resource server. A detailed protocol overview and authorization process, along with security analysis of OAuth 2.0, are also disc…
  • SAVE -10% with code: EXTRA

Authorization and Access Control (e-book) (used book) | bookbook.eu

Reviews

Description

This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important key concepts are discussed regarding login credentials with restricted access to third parties with a primary account as a resource server. A detailed protocol overview and authorization process, along with security analysis of OAuth 2.0, are also discussed in the book. Case studies of websites with vulnerability issues are included.

FEATURES

  • Provides an overview of the security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms
  • Discusses a behavioral analysis of threats and attacks using UML base modeling
  • Covers the use of the OAuth 2.0 Protocol and UMA for connecting web applications
  • Includes role-based access control (RBAC), discretionary access control (DAC), mandatory access control (MAC) and permission-based access control (PBAC)
  • Explores how to provide access to third-party web applications through a resource server by use of a secured and reliable OAuth 2.0 framework

This book is for researchers and professionals who are engaged in IT security, auditing and computer engineering.

EXTRA 10 % discount with code: EXTRA

144,35
160,39 €
We will send in 10–14 business days.

The promotion ends in 20d.09:09:56

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,60 Book Euros!?
  • Author: Parikshit N Mahalle
  • Publisher:
  • ISBN-10: 103221452X
  • ISBN-13: 9781032214528
  • Format: 14 x 21.6 x 0.6 cm, hardcover
  • Language: English English

This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important key concepts are discussed regarding login credentials with restricted access to third parties with a primary account as a resource server. A detailed protocol overview and authorization process, along with security analysis of OAuth 2.0, are also discussed in the book. Case studies of websites with vulnerability issues are included.

FEATURES

  • Provides an overview of the security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms
  • Discusses a behavioral analysis of threats and attacks using UML base modeling
  • Covers the use of the OAuth 2.0 Protocol and UMA for connecting web applications
  • Includes role-based access control (RBAC), discretionary access control (DAC), mandatory access control (MAC) and permission-based access control (PBAC)
  • Explores how to provide access to third-party web applications through a resource server by use of a secured and reliable OAuth 2.0 framework

This book is for researchers and professionals who are engaged in IT security, auditing and computer engineering.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)