Chapter 8. The Alchemy of Security Design–Methodology, Patterns, and Reality Checks

In a typical application development environment, architects and developers share similar experiences. They deploy business applications in a highly compressed time frame—making the applications work, testing the functionality at all levels, ensuring that they meet expected system performance or service levels, and wrapping the applications with an attractive client presentation and user documentation. ...

Get Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.