If you are an application developer, software architect, security engineer, or even casual programmer looking to leverage the power of OAuth 2.0, this book is for you. A basic knowledge of programming and OAuth 2.0 is recommended.
OAuth 2.0 is a powerful authorization framework that enables your application to interact with the world's most popular service providers, allowing you to leverage their world-class technologies in your own application.
At the start of this book, you will learn what OAuth 2.0 is, how it works, and the steps involved in creating an OAuth 2.0 application. You will first look at the process of registering your client application. Following this, you will explore the different supported workflows, their differences, and when they should be used. Once this groundwork is laid, you will put that knowledge to use by creating a sample application that talks to Facebook using OAuth 2.0.
By the end of the book, you will know how to make a secure and robust OAuth 2.0 application. You will explore different tools and effective methods for debugging. In addition, you will look at important security considerations for your application. Finally, you will understand the different implications of making a native mobile application versus a traditional web application.
"synopsis" may belong to another edition of this title.
Charles Bihis
Charles Bihis is a scientist and engineer from Vancouver, Canada. Earning his degree in computer science from the University of British Columbia, specializing in software engineering, he enjoys exploring the boundaries of technology. He believes that technology is the key to enriching the lives of everyone around us and strives to solve problems people face every day. Reach out to him on his website, www.whoischarles.com, and let's solve the world's problems together!
"About this title" may belong to another edition of this title.
FREE shipping within U.S.A.
Destination, rates & speedsSeller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less 0.92. Seller Inventory # G1784395404I2N00
Quantity: 1 available
Seller: HPB-Red, Dallas, TX, U.S.A.
paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_442858250
Quantity: 1 available
Seller: Best Price, Torrance, CA, U.S.A.
Condition: New. SUPER FAST SHIPPING. Seller Inventory # 9781784395407
Quantity: 1 available
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLIING23Mar2912160166235
Quantity: Over 20 available
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9781784395407
Quantity: Over 20 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9781784395407
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9781784395407
Quantity: Over 20 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand pp. 238. Seller Inventory # 371237932
Quantity: 4 available
Seller: Rarewaves.com USA, London, LONDO, United Kingdom
Digital. Condition: New. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization FrameworkAbout This Book. Learn how to use the OAuth 2.0 protocol to interact with the world's most popular service providers, such as Facebook, Google, Instagram, Slack, Box, and more. Master the finer details of this complex protocol to maximize the potential of your application while maintaining the utmost of security. Step through the construction of a real-world working application that logs you in with your Facebook account to create a compelling infographic about the most important person in the world-you!Who This Book Is ForIf you are an application developer, software architect, security engineer, or even a casual programmer looking to leverage the power of OAuth, Mastering OAuth 2.0 is for you. Covering basic topics such as registering your application and choosing an appropriate workflow, to advanced topics such as security considerations and extensions to the specification, this book has something for everyone. A basic knowledge of programming and OAuth is recommended.What You Will Learn. Discover the power and prevalence of OAuth 2.0 and use it to improve your application's capabilities. Step through the process of creating a real-world application that interacts with Facebook using OAuth 2.0. Examine the various workflows described by the specification, looking at what they are and when to use them. Learn about the many security considerations involved with creating an application that interacts with other service providers. Develop your debugging skills with dedicated pages for tooling and troubleshooting. Build your own rich, powerful applications by leveraging world-class technologies from companies around the worldIn DetailOAuth 2.0 is a powerful authentication and authorization framework that has been adopted as a standard in the technical community. Proper use of this protocol will enable your application to interact with the world's most popular service providers, allowing you to leverage their world-class technologies in your own application. Want to log your user in to your application with their Facebook account? Want to display an interactive Google Map in your application? How about posting an update to your user's LinkedIn feed? This is all achievable through the power of OAuth.With a focus on practicality and security, this book takes a detailed and hands-on approach to explaining the protocol, highlighting important pieces of information along the way.At the beginning, you will learn what OAuth is, how it works at a high level, and the steps involved in creating an application. After obtaining an overview of OAuth, you will move on to the second part of the book where you will learn the need for and importance of registering your application and types of supported workflows. You will discover more about the access token, how you can use it with your application, Seller Inventory # LU-9781784395407
Quantity: Over 20 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9781784395407_new
Quantity: Over 20 available