- Hands-On Spring Security 5 for Reactive Applications
- Tomcy John
- 324字
- 2021-07-23 18:59:09
How examples are structured
It's important that you understand how we will be using examples in this book. Since the book tries to give lots of detail on Spring Security 5 and its reactive aspects, we will not have a single use case throughout the book. Instead, we will keep creating small projects to help you understand each of the core concepts covered. Here are some of the important aspects of the code base within this book:
- Most concepts will be covered using a standalone Spring Boot project.
- At times, we will use the famous Spring Initializr (https://start.spring.io/) to bootstrap our sample Spring Boot application. In other cases, we will start with a base project that we already have and introduce more concepts through code.
- Generally, we will be using Java configuration. At times, we might use XML-based configurations.
- We will keep our examples as simple as possible so that we don't lose focus on the core concept being introduced.
- Even though this book is focused on reactive applications, we will not be covering this each time it is introduced. At times, we will just be doing plain, old imperative programming as it is more important to know reactive programming and use it when required. It's not that we have to use reactive code everywhere possible, just use it where you see fit.
- We will be using VS Code for all the projects, and we'll be using the extensions available in VS Code to the fullest. We will also be using the Spring Initializr extension rather than using online Spring Initializr.
- We will be using Maven most of the time in this book. There might be a case where we try Gradle.
- Sometimes, we might use IntelliJ IDE and you'll see some screenshots showing this.
- We'll be using the latest Spring Boot release version, namely 2.0.0. RELEASE. This is the latest release version of Spring Boot at the time of writing this book.
推薦閱讀
- Android應(yīng)用安全實(shí)戰(zhàn):Frida協(xié)議分析
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- Mobile Forensics Cookbook
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- 黑客攻防技巧
- Mastering Kali Linux for Advanced Penetration Testing
- 工業(yè)物聯(lián)網(wǎng)安全
- Kali Linux Network Scanning Cookbook(Second Edition)
- 計(jì)算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- Web安全之深度學(xué)習(xí)實(shí)戰(zhàn)
- 網(wǎng)絡(luò)關(guān)鍵設(shè)備安全檢測實(shí)施指南
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應(yīng)用與數(shù)據(jù)安全
- 云計(jì)算安全:關(guān)鍵技術(shù)、原理及應(yīng)用
- 信息組織
- 紅藍(lán)攻防:技術(shù)與策略(原書第3版)