Spring Security in Action **By Laurențiu Spilcă Amazon | Manning | YouTube | Books | livebook PART 1. FIRST STEPS 1 SECURITY TODAY 2 HELLO SPRING SECURITY PART 2. IMPLEMENTATION 3 MANAGING USERS 4 DEALING WITH PASSWORDS 5 IMPLEMENTING AUTHENTICATION 6 HANDS-ON: A SMALL SECURED WEB APPLICATION 7 CONFIGURING AUTHORIZATION: RESTRICTING ACCESS 8 CONFIGURING AUTHORIZATION: APPLYING RESTRICTIONS 9 IMPLEMENTING FILTERS 10 APPLYING CSRF PROTECTION AND CORS 11 HANDS-ON: A SEPARATION OF RESPONSIBILITIES 12 HOW DOES OAUTH 2 WORK? 13 OAUTH 2: IMPLEMENTING THE AUTHORIZATION SERVER 14 OAUTH 2: IMPLEMENTING THE RESOURCE SERVER 15 OAUTH 2: USING JWT AND CRYPTOGRAPHIC SIGNATURES 16 GLOBAL METHOD SECURITY: PRE- AND POSTAUTHORIZATIONS 17 GLOBAL METHOD SECURITY: PRE- AND POSTFILTERING 18 HANDS-ON: AN OAUTH 2 APPLICATION 19 SPRING SECURITY FOR REACTIVE APPS 20 SPRING SECURITY TESTING APPENDIXES APPENDIX A: CREATING A SPRING BOOT PROJECT