Day 15. Security
So far, you have developed your J2EE application without considering security. Now you will look at how to add security constraints to your system to prevent loss of privacy or to keep unauthorized clients from accessing data and causing accidental or malicious damage.
In today's lesson, you will look at
How the J2EE specification supports the common requirements for a secure system
The common terminology used when discussing system security
Symmetric and asymmetric encryption
Securing a J2EE application using principals and roles
Using declarative security for EJBs and Web pages
Using programmatic security in EJBs and Web pages
Supplying security credentials to an LDAP naming service provider for JNDI
Security is an essential aspect ...
Get Sams Teach Yourself J2EE™ in 21 Days, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.