O'Reilly logo

Spring Security 3 by Peter Mularien

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix A. Additional Reference Material

In this appendix, we will cover some reference material which we feel is helpful (and largely undocumented), but too comprehensive to insert into the text of the chapters.

Getting started with JBCP Pets sample code

As we described in Chapter 1, Anatomy of an Unsafe Application, we have made the assumption that you have access to the Eclipse 3.4 (or 3.5) IDE, with the Web Tools Package (WTP). The sample code is structured into different ZIP files, one per chapter, with a single large dependencies ZIP file containing all the dependencies required to compile and run the sample application (note that these may be out of date with the most current versions of Spring Security by the time you read this book, but ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required