- Hands-On Spring Security 5 for Reactive Applications
- Tomcy John
- 155字
- 2021-07-23 18:59:18
Summary
In this chapter, we introduced you to new application requirements and then moved to some of the core reactive concepts. We looked at the Reactive Manifesto and reactive programming. We then moved our attention to Spring 5 and Spring Security 5, and touched on some of the new features in it, especially regarding reactive programming. We then looked briefly at Spring's reactive programming efforts by introducing you to Project Reactor. After that, we explored Spring Security in a bit more detail to refresh your thoughts on this subject. Finally, we closed this chapter by giving you an idea of how examples would be structured in this book and what coding practices we will be using.
You should now have a good grasp on reactive programming, and on Spring Security and how it works. You should also have a clear understanding of how to go through the rest of the chapters, especially the example code.
- 科技安全:戰(zhàn)略實(shí)踐與展望
- CTF實(shí)戰(zhàn):技術(shù)、解題與進(jìn)階
- Kali Linux CTF Blueprints
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- Penetration Testing with Perl
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- API攻防:Web API安全指南
- 數(shù)據(jù)安全與隱私計(jì)算(第3版)
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Web安全之深度學(xué)習(xí)實(shí)戰(zhàn)
- 黑客攻防從入門到精通
- 隱私計(jì)算:推進(jìn)數(shù)據(jù)“可用不可見”的關(guān)鍵技術(shù)
- VMware vCloud Security
- 網(wǎng)絡(luò)服務(wù)安全與監(jiān)控
- Mastering Linux Security and Hardening