Book Image

Learning Modular Java Programming

By : Tejaswini Mandar Jog
Book Image

Learning Modular Java Programming

By: Tejaswini Mandar Jog

Overview of this book

Modular programming means dividing an application into small parts and then developing it. It is an approach taken by developers to build applications and helps them add efficiency in their development process, thus making it more effective. The book starts with the fundamentals of Modular Programming. Then we move on to the actual implementation, where we teach developers how to divide an application into different modules or layers (such as presentation, execution, security, lifecycle, services, and so on) for better management. Once readers are well-versed in these modules and their development, the book shows how to create bindings in order to join these different modules and form a complete application. Next, the readers will learn how to manage these modules through dependency injection. Later, we move on to testing; readers will learn how to test the different modules of an application. The book ends by teaching readers how to maintain different versions of their application and how to modify it. By the end of the book, readers will have a good understanding of modular programming and will be able to use it to build applications with Java.
Table of Contents (15 chapters)

Make it safe, make it secure


On the Web, all data gets transferred through a channel where it is possible for someone else to steal the information which you are sending or receiving from the server. This stolen data can be misused and can affect the website as well as the user badly. Let's take the example of accessing mail accounts. Whenever we try to access our mail accounts, the URL gets changed from http to https, which shows we are going to access something secure. Some extra measures have been taken in order to protect the data as it goes to and fro, from the security perspective.

The security consists of the following:

  • Authentication: This is the process by which the application checks whether the user is who they are claiming to be or not. If we want to check our e-mails, we cannot do it directly unless and until we prove that we are the right person. How do we do that? For that, we need to provide our mail ID and correct password. The application will check if this e-mail ID and...