Table of Contents
Preface
Part 1: Fundamentals of Application Security
1
Anatomy of an UnsafeApplication
Exploring software architecture styles
Monolithic architecture
N-Tier architecture (layered architecture)
SOA
Microservices architecture
Choosing between traditional web applications and Single-Page Applications
Understanding security audit
Exploring the example application
The JBCP calendar application architecture
Reviewing the audit results
Addressing the security audit findings
Authentication
Authorization
Database credential security
Sensitive information
Transport-level protection
Using Spring Security 6 to address security concerns
Technical requirements
Summary
2
Getting Started with Spring Security
Hello Spring Security
Importing ...
Get Spring Security - Fourth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.