O'Reilly logo

Spring Security 3 by Peter Mularien

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we have:

  • Reviewed common points of risk in an unsecured web application
  • Reviewed the basic architecture of the sample e-commerce application
  • Discussed the strategies for securing the e-commerce application

In Chapter 2, we'll examine Spring Security's overall architecture, with a specific eye towards the many places where it can be extended and configured to support your application's needs.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required