Torrent details for "Archer G. Cloud Native Data Security with OAuth. A Scalable Zero…" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
None
Total Size:
9.5 MB
Info Hash:
CAFCC07FF7CB9DDE2FAF9B88D533D9704EC2C198
Added By:
Added:
April 21, 2026, 9:42 a.m.
Stats:
|
(Last updated: April 21, 2026, 9:45 a.m.)
| File | Size |
|---|---|
| Code.zip | 1.5 MB |
| Archer G. Cloud Native Data Security with OAuth. A Scalable Zero Trust Arch.2025.pdf | 8.1 MB |
Name
DL
Uploader
Size
S/L
Added
-
888.2 MB
[0
/
2]
2024-04-13
| Uploaded by IGGGAMESCOM | Size 888.2 MB | Health [ 0 /2 ] | Added 2024-04-13 |
-
905.6 MB
[16
/
13]
2025-07-16
| Uploaded by IGGGAMESCOM | Size 905.6 MB | Health [ 16 /13 ] | Added 2025-07-16 |
-
727.0 MB
[11
/
11]
2023-07-01
| Uploaded by Pornlake | Size 727.0 MB | Health [ 11 /11 ] | Added 2023-07-01 |
NOTE
SOURCE: Archer G. Cloud Native Data Security with OAuth. A Scalable Zero Trust Arch.2025
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
Textbook in PDF format With the growth of cloud native applications, developers increasingly rely on APIs to make everything work. But security often lags behind, making APIs an attractive target for bad actors looking to access valuable business data. OAuth is a popular way to address this issue, but this open standard doesn't provide sufficient guidelines for using API tokens to protect business data. That alone can lead to vulnerabilities and invite data breaches. By using cloud native components in Kubernetes or similar platforms, organizations can implement a scalable, future-proof security architecture for their systems that follows a zero-trust approach to protect business data. You'll access tokens, claims, and token design with an emphasis on an API-first approach. This book takes readers through an end-to-end security architecture that scales to many components in a cloud native environment, while only requiring simple security code in applications and APIs. You'll learn: Why user identity must be part of your cloud native security stack How to integrate user identity into APIs How to externalize security, secure data access, and authenticate clients using OAuth Methods for running security components in a Kubernetes cluster How to use claims to protect business data in APIs How to follow security best practices for client applications and APIs
×


