Chapter 6. Web Application Security

Terms you'll need to understand:

  • Authentication

  • Authorization

  • Data integrity

  • Auditing

  • Malicious code

  • Web site attacks

  • Security constraint

  • Login configuration

  • Security role

Techniques you'll need to master:

  • Define authentication.

  • Identify BASIC, DIGEST, FORM, and CLIENT-CERT authentication types.

  • Define data integrity.

  • Define auditing.

  • Describe malicious code and Web site attacks.

  • Identify the deployment descriptor element names, and their structure, that declare a security constraint, a Web resource, the login configuration, and a security role.

Web Application Security Overview

A Web application is fundamentally built to invite many people to access it. At least one of these people is a jerk or, worse, a malicious malcontent. ...

Get Java™ 2 Enterprise Edition (J2EE™) Web Component Developer Exam Cram™ 2 (Exam 310-080) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.