O'Reilly logo

Java™ 2 Enterprise Edition (J2EE™) Web Component Developer Exam Cram™ 2 (Exam 310-080) by Alain Trottier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Web Application Security

Terms you'll need to understand:

  • Authentication

  • Authorization

  • Data integrity

  • Auditing

  • Malicious code

  • Web site attacks

  • Security constraint

  • Login configuration

  • Security role

Techniques you'll need to master:

  • Define authentication.

  • Identify BASIC, DIGEST, FORM, and CLIENT-CERT authentication types.

  • Define data integrity.

  • Define auditing.

  • Describe malicious code and Web site attacks.

  • Identify the deployment descriptor element names, and their structure, that declare a security constraint, a Web resource, the login configuration, and a security role.

Web Application Security Overview

A Web application is fundamentally built to invite many people to access it. At least one of these people is a jerk or, worse, a malicious malcontent. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required