November 2017
Intermediate to advanced
542 pages
14h 24m
English
In this chapter, we have reviewed the common points of risk in an unsecured web application and the basic architecture of the sample application. We have also discussed the strategies for securing the application.
In the next chapter, we'll explore how to get Spring Security set up quickly and get a basic understanding of how it works.
Read now
Unlock full access