O'Reilly logo

Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management by Ray Lai, Ramesh Nagappan, Christopher Steel

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Basics of Security

The quickest and most reliable way to secure your computer is to not turn it on. Because that’s not a viable option, you are left with a variety of complex possibilities. As a software developer, you must completely understand the basics of security before beginning the software design. Security is a broad term that includes all physical and logical access to business locations, resources, and data. As a software developer, you must have an equally broad knowledge of the environment ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required