Book Image

Apache Wicket Cookbook

By : Igor Vaynberg
Book Image

Apache Wicket Cookbook

By: Igor Vaynberg

Overview of this book

<p>Apache Wicket is one of the most famous Java web application frameworks. Wicket simplifies web development and makes it fun. Are you bored of going through countless pages of theory to find out how to get your web development done? With this book in hand, you don't need to go through hundreds of pages to figure out how you will actually build a web application. You will get practical solutions to your common everyday development tasks to pace up your development activities.</p> <p><i>Apache Wicket Cookbook</i> provides you with information that gets your problems solved quickly without beating around the bush. This book is perfect for you if you are ready to take the next step from tutorials and step into the practical world. It will take you beyond the basics of using Apache Wicket and show you how to leverage Wicket's advanced features to create simpler and more maintainable solutions to what at first may seem complex problems.</p> <p>You will learn how to integrate with client-side technologies such as JavaScript libraries or Flash components, which will help you to build your application faster. You will discover how to use Wicket paradigms to factor out commonly used code into custom Components, which will reduce the maintenance cost of your application, and how to leverage the existing Wicket Components to make your own code simpler.</p>
Table of Contents (18 chapters)
Apache Wicket Cookbook
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Introduction


This chapter focuses on implementing authentication and authorization in your Wicket applications. Here, we will examine how to log users in and out of the application, as well as how to isolate access to a subset of pages to only users who are logged in. We will also examine how to authorize components based on the user who has logged in, allowing them to respond to the permissions of that user. Finally, we will look at some general ways to secure the application from outside tampering.