上QQ阅读APP看书,第一时间看更新
Summary
In this chapter, we have reviewed the common points of risk in an unsecured web application and the basic architecture of the sample application. We have also discussed the strategies for securing the application.
In the next chapter, we'll explore how to get Spring Security set up quickly and get a basic understanding of how it works.