RESTful Java Web Services Security

RESTful Java Web Services Security

4.0 1
by Rene Enriquez, Andrés Salazar
     
 

View All Available Formats & Editions

With the growing adoption of service integration on enterprise platforms, building robust systems and protecting the information exchanged between these systems is the need of the hour for many organizations. Over time, the use of RESTful services has been increasing in order to get much more secure applications. One of the key characteristics of a RESTful Web

Overview

With the growing adoption of service integration on enterprise platforms, building robust systems and protecting the information exchanged between these systems is the need of the hour for many organizations. Over time, the use of RESTful services has been increasing in order to get much more secure applications. One of the key characteristics of a RESTful Web Service is that it provides means to apply a set of measures to prevent vulnerabilities that can affect the privacy of controlled data or lead to the misuse of resources. It is strictly necessary to include high-level security in different approaches since the information being handled is very sensitive.

This book will serve as a practical companion for you to learn about common vulnerabilities when using RESTful services, and will provide you with an indispensable knowledge of the tools you can use to implement and test security on your applications. This book starts by describing how to set up the development environment and explaining why securing web services is important. The book will cover the fine details of setting up RESTful services such as implementing RESTEasy and securing transmission protocols such as the OAuth protocol and its integration with RESTEasy. Furthermore, the book explains the implementation of digital signatures and the integration of the Doseta framework with RESTEasy.

With this book, you will be able to design your own security implementation or use a protocol to grant permissions over your RESTful applications with OAuth. You will also gain knowledge about the working of other features such as configuring and verifying HTTP and HTTPS protocols, certificates, and secure protocols for data transmission. By the end of this book, you will have a comprehensive knowledge that will help you to detect and solve vulnerabilities.

Product Details

ISBN-13:
9781783980109
Publisher:
Packt Publishing
Publication date:
07/14/2014
Pages:
144
Product dimensions:
7.50(w) x 9.25(h) x 0.31(d)

Meet the Author

René Enríquez is currently a software architect for a multinational company headquartered in India. He has previously worked on many projects related to security implementation using frameworks like JAAS and Spring Security to integrate many platforms based on web, BPM, CMS, and web services for government and private sector companies. René is a technology and innovation enthusiast, and is currently working with several programming languages. He has achieved the following certifications:

  • Oracle Certified Professional, Java SE 6 Programmer
  • Microsoft Technology Associate
  • Cisco Network Operating Systems

During the past few years, he has worked as a software consultant on various projects for private and government companies and as an instructor of courses to build enterprise and mobile applications. He is also an evangelist of best practices for application development and integration.

" "

Andrés Salazar is currently working at one of the most prestigious government companies in Ecuador, performing tasks related to software development and security implementation based on JAAS and digital signatures for secure applications. He also has an extensive knowledge of OAuth implementation on web projects. He is a technology and agile enthusiast, and has worked on several projects using JEE technology and TDD. He has achieved the following certifications:

  • Oracle Certified Professional, Java SE 6 Programmer
  • Certified Scrum Developer

 

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >

RESTful Java Web Services Security 4 out of 5 based on 0 ratings. 1 reviews.
Boudville More than 1 year ago
The book may be pertinent to programmers of cloud computing. The authors strive to make the discussion relevant in the context of you having applications that hook up to Facebook, Twitter, Tumblr and others. Often, sites like these expose an API for an overlay of independent firms (like yours?) to build analysis engines. One practical consequence is that unlike a book on RESTful web services from a few years ago, there is now an explanation of authentication using API keys. Perhaps earlier texts had underplayed this, not appreciating its then significance. As you can appreciate, web security is now a crucial part of practical deployed web services. The book devotes quite a bit of space to the topic. Some readers will appreciate that you don't need a background in the deep level maths of public and private keys. The book keeps the discussion at a level that deprecates the essential maths to lower level routines that can be safeful ignored. Your remit is to understand and use the management of these keys. The closest we get to the maths is in the last chapter. But even here, it is not the maths you need to understand, but the tasks above it, like verifying signatures and encrypting a message body.