Conclusion


This case study has provided us with a good example of the many factors that go into securing a real-world application. It has taught us some lessons, revealed some pitfalls, and provided a detailed example of how to use some of the core security patterns. If you have made it this far, then congratulations are in order. You are now ready to start putting your experience to the test in the real world.

When it comes to security, the devil is in the details. As you move forward and begin to bake security into your development process, remember the process itself and pay attention to the details. You simply can't take shortcuts. A good security implementation requires that you make it a part of your development culture and follow through on it thoroughly.




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net