Reviews
Description
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important key concepts are discussed regarding login credentials with restricted access to third parties with a primary account as a resource server. A detailed protocol overview and authorization process, along with security analysis of OAuth 2.0, are also discussed in the book. Case studies of websites with vulnerability issues are included.
FEATURES
This book is for researchers and professionals who are engaged in IT security, auditing and computer engineering.
EXTRA 10 % discount with code: EXTRA
The promotion ends in 20d.09:09:56
The discount code is valid when purchasing from 10 €. Discounts do not stack.
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important key concepts are discussed regarding login credentials with restricted access to third parties with a primary account as a resource server. A detailed protocol overview and authorization process, along with security analysis of OAuth 2.0, are also discussed in the book. Case studies of websites with vulnerability issues are included.
FEATURES
This book is for researchers and professionals who are engaged in IT security, auditing and computer engineering.
Reviews