Chapter 8. The Alchemy of Security Design–Methodology, Patterns, and Reality Checks

In a typical application development environment, architects and developers share similar experiences. They deploy business applications in a highly compressed time frame—making the applications work, testing the functionality at all levels, ensuring that they meet expected system performance or service levels, and wrapping the applications with an attractive client presentation and user documentation. ...

Get Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.