August 2018
Intermediate to advanced
372 pages
9h 29m
English
In this chapter, we explained how to apply security guidelines and practices to cover the most common security issues that you may encounter with your applications. Here, we covered authentication and authorization, cryptography, data input validation, sensitive data, the OWASP Top 10, social engineering, and penetration testing. These concepts and methodologies will strengthen the security of your applications.
In the next chapter, we will review high-performance techniques and recommendations in order to complete our journey of creating applications using Spring 5.
Read now
Unlock full access