November 2017
Intermediate to advanced
542 pages
14h 24m
English
In this chapter, we covered several security vulnerabilities, as well employing Spring Security to circumvent those vulnerabilities. After reading this chapter, you should understand the threat of CSRF and use of the synchronizer tokens to prevent CSRF.
You should also know how to include various HTTP headers to protect against common security vulnerabilities using the Cache-Control, Content-Type Options, HSTS, X-Frame-Options, and X-XSS-Protection methods.
In the next chapter, we will discuss how to migrate from Spring Security 3.x to Spring Security 4.2.
Read now
Unlock full access