File Size: 639 KB
Print Length: 83 pages
Simultaneous Device Usage: Unlimited
Publication Date: October 26, 2015
Sold by: Digital Services LLC
Language: English
ASIN: B0178H570A
Text-to-Speech: Enabled
X-Ray: Not Enabled
Word Wise: Not Enabled
Lending: Not Enabled
Enhanced Typesetting: Enabled
Best Sellers Rank: #258,675 Paid in Kindle Store (See Top 100 Paid in Kindle Store) #80 in Books > Computers & Technology > Web Development & Design > Web Services #311 in Kindle Store > Kindle Short Reads > Two hours or more (65-100 pages) > Computers & Technology #368 in Kindle Store > Kindle eBooks > Computers & Technology > Networking > Networks, Protocols & API's
This is a good description of OAuth 2.0 from a technical point of view. It describes in detail the components and message structure of the methodology. It also covers some common implementations of OAuth 2.0 in a useful manner.
This book is nice. I have no idea on what OAuth is all about. This book was well written and it contains information on how to use it as well as where to use it. The book made mention of the roles and types of OAuth 2.0. I am going to give this book to my brother to read since he has more idea on the ICT world. I believe he would benefit a lot from it.
This book seems to be a white paper published in a large font and bound. It doesn't contain many examples. You can do better googling for oauth2 tutorials or reading the OAuth documentation at [...]
This book is completely cheating !!! should stop selling such cheating !!!The whole book is less than 60 pages. There is no page number, very big font and huge space.Two line texts " An authorization request + response" and "A token request + response"use half page. You can image how big the space it is and such space appear in the whole so-call "Book".All texts are useless!!!
Informing and useful book! This book is for those who want to get proper understanding of OAuth 2 which is a standard used for the purpose of authorization. With it, client machines are provided with an easy and secure mechanism on how they can access the resources of the server on behalf of the resource owner. Really worth recommending!
OAuth 2.0: Introduction to API Security with OAuth 2.0 OAuth 2.0: Getting Started in API Security (API-University Series Book 1) OAuth 2.0: Getting Started in Web-API Security (API University Series) (Volume 1) RESTful API Design: Best Practices in API Design with REST (API-University Series Book 3) Pro ASP.NET Web API Security: Securing ASP.NET Web API (Expert's Voice in .NET) Twitter API: Up and Running: Learn How to Build Applications with the Twitter API API Architecture: The Big Picture for Building APIs (API-University Series Book 2) Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network) Social Security: Time for a Life of Leisure - The Guide of Secrets to Maximising Social Security Retirement Benefits and Planning Your Retirement (social ... disability, social security made simple) Maritime Security: An Introduction (Butterworth-Heinemann Homeland Security) Terrorism and Homeland Security: An Introduction with Applications (Butterworth-Heinemann Homeland Security) Web Audio API Build APIs You Won't Hate: Everyone and their dog wants an API, so you should probably learn how to build them API-Driven DevOps: Strategies for Continuous Deployment Winning in the API Economy The API Economy: Disruption and the Business of APIs Google Maps JavaScript API V3 Beginners Master (Japanese Edition) Essential Winlnet: Developing Applications Using the Windows Internet API with RAS, ISAPI, ASP, and COM Apache Cordova API Cookbook (Mobile Programming) Advanced Windows: The Developer's Guide to the WIN32 API for Windows NT 3.5 and Windows 95