This document provides an overview of ASP.NET Web API, a framework for building RESTful web services. It discusses key REST concepts like URIs, HTTP verbs, and HATEOAS. It also compares Web API to other technologies like WCF and SOAP, noting advantages of REST such as simpler CRUD operations and standardized development methodology. The document recommends resources like a book on building REST services from start to finish with ASP.NET MVC 4 and Web API.
The document discusses OAuth2 and Spring Security. It provides an overview of OAuth2 concepts including the four main roles (resource owner, resource server, client, and authorization server), four common grant types (authorization code, implicit, resource owner password credentials, and client credentials), and how to implement OAuth2 flows in Spring Security. Sample OAuth2 applications using Spring Security are also mentioned.
A directive is a custom HTML element that is used to extend the power of HTML. Angular 2 has the following directives that get called as part of the BrowserModule module.
ngif
ngFor
If you view the app.module.ts file, you will see the following code and the BrowserModule module defined. By defining this module, you will have access to the 2 directives.
This document provides an overview of ASP.NET Web API, a framework for building RESTful web services. It discusses key REST concepts like URIs, HTTP verbs, and HATEOAS. It also compares Web API to other technologies like WCF and SOAP, noting advantages of REST such as simpler CRUD operations and standardized development methodology. The document recommends resources like a book on building REST services from start to finish with ASP.NET MVC 4 and Web API.
The document discusses OAuth2 and Spring Security. It provides an overview of OAuth2 concepts including the four main roles (resource owner, resource server, client, and authorization server), four common grant types (authorization code, implicit, resource owner password credentials, and client credentials), and how to implement OAuth2 flows in Spring Security. Sample OAuth2 applications using Spring Security are also mentioned.
A directive is a custom HTML element that is used to extend the power of HTML. Angular 2 has the following directives that get called as part of the BrowserModule module.
ngif
ngFor
If you view the app.module.ts file, you will see the following code and the BrowserModule module defined. By defining this module, you will have access to the 2 directives.
This document provides an overview of Spring Security including:
I. It distinguishes Spring Framework, Spring Boot, and Spring Security and their relationships.
II. It defines Spring Security as a framework focusing on authentication and authorization for Java applications.
III. It outlines some of the core concepts in Spring Security such as Principal, Authentication, Authorization, GrantedAuthority etc.
The document serves as an introduction to Spring Security fundamentals and architecture.
The document discusses the jQuery framework, explaining why jQuery should be used, what the $() function does, how to write unobtrusive JavaScript, and how to extend jQuery through plugins. It also covers using jQuery with other libraries by relinquishing control of the $ variable through the $.noConflict() method. Key features of jQuery include its small file size, cross-browser compatibility, and ease of selecting, manipulating, and animating elements.
The document discusses the basic steps for configuring Spring Security:
1. Set dependencies and create a WebSecurityConfigurerAdapter configuration class
2. Configure authentication using in-memory, JDBC, or LDAP
3. Ensure the security configuration is loaded by registering WebSecurityConfiguration
4. Configure the springSecurityFilterChain by extending AbstractSecurityWebApplicationInitializer
It provides code examples for configuring different authentication types and securing different URL patterns.
What is JWT?
When should you use JSON Web Tokens?
WHAT IS THE JSON WEB TOKEN STRUCTURE?
JWT Process
PROS AND CONS
JWT.IO
Using JSON Web Tokens as API Keys
This document provides an overview of Spring Security, including what it is, how it handles authentication and authorization, and how to configure it. Spring Security provides comprehensive security services for Java enterprise applications, including authentication support for databases, LDAP, CAS, and custom authentication. It handles authentication through establishing a user's identity and authorization through controlling user access to resources. The document discusses configuring Spring Security through Java configuration and XML files, and covers topics like security filters, access control patterns, and the basic authentication process.
This document discusses starting a mobile app development company. It provides details on the company's founding in 2015, services offered such as mobile app development and information technology consulting. It also includes charts showing the company's growth, with revenue increasing from KRW 17,500 in January 2016 to KRW 62,000 by September 2017 as the number of employees grew from 2 to 15 over the same period. The document advocates that the company will continue achieving growth and success by focusing on customer satisfaction.
Spring Security is a powerful and highly customizable authentication and authorization framework for Spring-based applications. It provides authentication via mechanisms like username/password, LDAP, and SSO. Authorization can be implemented through voting-based access control or expression-based access control at the web (URL) level and method level. It includes filters, providers, and services to handle authentication, authorization, logout, and remember-me functionality. Configuration can be done through XML or Java configuration with support for common annotations.
This document provides an overview of Spring Security including:
I. It distinguishes Spring Framework, Spring Boot, and Spring Security and their relationships.
II. It defines Spring Security as a framework focusing on authentication and authorization for Java applications.
III. It outlines some of the core concepts in Spring Security such as Principal, Authentication, Authorization, GrantedAuthority etc.
The document serves as an introduction to Spring Security fundamentals and architecture.
The document discusses the jQuery framework, explaining why jQuery should be used, what the $() function does, how to write unobtrusive JavaScript, and how to extend jQuery through plugins. It also covers using jQuery with other libraries by relinquishing control of the $ variable through the $.noConflict() method. Key features of jQuery include its small file size, cross-browser compatibility, and ease of selecting, manipulating, and animating elements.
The document discusses the basic steps for configuring Spring Security:
1. Set dependencies and create a WebSecurityConfigurerAdapter configuration class
2. Configure authentication using in-memory, JDBC, or LDAP
3. Ensure the security configuration is loaded by registering WebSecurityConfiguration
4. Configure the springSecurityFilterChain by extending AbstractSecurityWebApplicationInitializer
It provides code examples for configuring different authentication types and securing different URL patterns.
What is JWT?
When should you use JSON Web Tokens?
WHAT IS THE JSON WEB TOKEN STRUCTURE?
JWT Process
PROS AND CONS
JWT.IO
Using JSON Web Tokens as API Keys
This document provides an overview of Spring Security, including what it is, how it handles authentication and authorization, and how to configure it. Spring Security provides comprehensive security services for Java enterprise applications, including authentication support for databases, LDAP, CAS, and custom authentication. It handles authentication through establishing a user's identity and authorization through controlling user access to resources. The document discusses configuring Spring Security through Java configuration and XML files, and covers topics like security filters, access control patterns, and the basic authentication process.
This document discusses starting a mobile app development company. It provides details on the company's founding in 2015, services offered such as mobile app development and information technology consulting. It also includes charts showing the company's growth, with revenue increasing from KRW 17,500 in January 2016 to KRW 62,000 by September 2017 as the number of employees grew from 2 to 15 over the same period. The document advocates that the company will continue achieving growth and success by focusing on customer satisfaction.
Spring Security is a powerful and highly customizable authentication and authorization framework for Spring-based applications. It provides authentication via mechanisms like username/password, LDAP, and SSO. Authorization can be implemented through voting-based access control or expression-based access control at the web (URL) level and method level. It includes filters, providers, and services to handle authentication, authorization, logout, and remember-me functionality. Configuration can be done through XML or Java configuration with support for common annotations.
13. 網路通訊原理
封裝/解封裝
接收端
傳送端
資料封裝
資料解封裝
實體層
資料鏈結層
網路層
傳輸層
會議層
展示層
應用層
Data
H7
Data
H6
Data
H5
Data
H4
Data
H3
T2
Data
H2
Data
H1
位元
訊框
封包
區段
Data
H7
Data
H6
Data
H5
Data
H4
Data
H3
T2
Data
H2
Data
H1
位元
訊框
封包
區段