This chapter has covered a number of different topics related to the core idea of creating secure applications. We went through our examples and applied security at different layers. However, the application exposed just the web layer to the clients, so we have added an access control list to it and encrypted its HTTP traffic.
In the next section, we illustrated how to protect middle-tier components, such as EJB and Web Services, applying authentication and authorization techniques, as well as encryption of the RMI/HTTP data transmission.
We have finished learning JBoss. If you are serious about learning JBoss AS (and sure that you have completed all the chapters!) you will reap big dividends in the years to come. As a proof of it, the number of people joining the community of developers is steadily growing and also the opportunities for expert developers and architects.
I hope that this book has given you the right instruments to improve your knowledge of the application server, whether...