Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
This case study has provided us with a good example of the many factors that go into securing a real-world application. It has taught us some lessons, revealed some pitfalls, and provided a detailed example of how to use some of the core security patterns. If you have made it this far, then congratulations are in order. You are now ready to start putting your experience to the test in the real world. When it comes to security, the devil is in the details. As you move forward and begin to bake security into your development process, remember the process itself and pay attention to the details. You simply can't take shortcuts. A good security implementation requires that you make it a part of your development culture and follow through on it thoroughly. |
Категории