Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying WildFly Configuration, Deployment, and Administration - Second Edition
  • Table Of Contents Toc
WildFly Configuration, Deployment, and Administration - Second Edition

WildFly Configuration, Deployment, and Administration - Second Edition - Second Edition

4.4 (5)
close
close
WildFly Configuration, Deployment, and Administration - Second Edition

WildFly Configuration, Deployment, and Administration - Second Edition

4.4 (5)

Overview of this book

This book is aimed at Java developers, system administrators, application testers using WildFly, and anyone who performs a DevOps role. Whether you are completely new to WildFly or just require an understanding of WildFly's new features, this book is for you.
Table of Contents (14 chapters)
close
close
13
Index

Securing the transport layer


If you create a mission-critical application with just the bare concepts we covered until now, you will not be guaranteed to be shielded from all security threats. For example, if you need to design a payment gateway, where credit card information is transmitted by means of an EJB or servlet, using just the authorization and authentication stack is really not enough.

In order to prevent disclosure of information, you have to use a protocol that provides data encryption. Encryption is the conversion of data into a form that cannot be understood by people or systems eavesdropping on your network. Conversely, decryption is the process of converting encrypted data back into its original form, so it can be understood.

The protocols used to secure communication are SSL and TLS, the latter being considered a replacement for the older SSL.

Note

The differences between the two protocols are minor. TLS uses stronger encryption algorithms and has the ability to work on different...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
WildFly Configuration, Deployment, and Administration - Second Edition
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon