Summary

In this chapter, we explained how to apply security guidelines and practices to cover the most common security issues that you may encounter with your applications. Here, we covered authentication and authorization, cryptography, data input validation, sensitive data, the OWASP Top 10, social engineering, and penetration testing. These concepts and methodologies will strengthen the security of your applications.

In the next chapter, we will review high-performance techniques and recommendations in order to complete our journey of creating applications using Spring 5.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.216.27.251