Java Reference
In-Depth Information
Summary
Having reached the end of this chapter, which is the last chapter of the topic, we are
now able to deploy a Java EE public solution with at least some level of security.
Indeed, through this chapter, readers become aware of a specification allowing them
to restrict access to the forms. However, it is important to note that we have just dealt
with one small aspect of security, given the objectives of this topic. We ask you to
complete your knowledge about security with additional reading. This is because the
domain is made up of several aspects such as the transmission of data across the
network, method execution, construction, and execution of SQL queries.
Search WWH ::




Custom Search