Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management
by Christopher Steel, Ramesh Nagappan, Ray Lai
Preface
“The problems that exist in the world today cannot be solved by the level of thinking that created them.” | ||
| --Albert Einstein | ||
Security now has unprecedented importance in the information industry. It compels every business and organization to adopt proactive or reactive measures that protect data, processes, communication, and resources throughout the information lifecycle. In a continuous evolution, every day a new breed of business systems is finding its place and changes to existing systems are becoming common in the industry. These changes are designed to improve organizational efficiency and cost effectiveness and to increase consumer satisfaction. These improvements are often accompanied by newer security risks, to which businesses ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access