Book Image

Learning Spring 5.0

By : Tejaswini Mandar Jog
Book Image

Learning Spring 5.0

By: Tejaswini Mandar Jog

Overview of this book

<p>Spring is the most widely used framework for Java programming and with its latest update to 5.0, the framework is undergoing massive changes. Built to work with both Java 8 and Java 9, Spring 5.0 promises to simplify the way developers write code, while still being able to create robust, enterprise applications.</p> <p>If you want to learn how to get around the Spring framework and use it to build your own amazing applications, then this book is for you.</p> <p>Beginning with an introduction to Spring and setting up the environment, the book will teach you in detail about the Bean life cycle and help you discover the power of wiring for dependency injection. Gradually, you will learn the core elements of Aspect-Oriented Programming and how to work with Spring MVC and then understand how to link to the database and persist data configuring ORM, using Hibernate.</p> <p>You will then learn how to secure and test your applications using the Spring-test and Spring-Security modules. At the end, you will enhance your development skills by getting to grips with the integration of RESTful APIs, building microservices, and doing reactive programming using Spring, as well as messaging with WebSocket and STOMP.</p>
Table of Contents (18 chapters)
Title Page
Credits
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface
9
Explore the Power of RESTful Web Services

Importance of security in an application


Some of the sites on a network are simply those that serve some information about nature, the world, geography, geometry, lifestyle, and so on. This information is used by the reader, and he will leave happily. The reader is not posting any data about his personal or financial information. However, such a site, if not protected, may contain some malicious content.

The web application is the very first impression of the company or the product to the customers to maintain business relations. These sites are used for business purposes, which may include interacting with customers to collect the required information to serve them in the best possible way. What if the information posted by the customer is being stolen?

There are many applications that provide an online shopping facility. The customers visit such sites quite frequently. They browse through it, and if they find something they are interested in, they will buy it. Most of the times, the credit...