Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Software Architecture with Spring

You're reading from   Software Architecture with Spring Design scalable and high-performance Java applications with Spring

Arrow left icon
Product type Paperback
Published in Jun 2025
Publisher Packt
ISBN-13 9781835880609
Length 464 pages
Edition 1st Edition
Languages
Arrow right icon
Author (1):
Arrow left icon
Wanderson Xesquevixos Wanderson Xesquevixos
Author Profile Icon Wanderson Xesquevixos
Wanderson Xesquevixos
Arrow right icon
View More author details
Toc

Table of Contents (21) Chapters Close

Preface 1. Part 1:Foundations of Software Architecture
2. Chapter 1: Diving into Software Architecture FREE CHAPTER 3. Chapter 2: Decision-Making Processes in Software Architecture 4. Chapter 3: Understanding the System Context 5. Part 2: Exploring Architectural Styles
6. Chapter 4: Monolithic Architecture 7. Chapter 5: Client-Server Architecture 8. Chapter 6: Microservices Architecture 9. Chapter 7: Microservices Patterns with Spring Cloud 10. Chapter 8: Event-Driven Architecture 11. Chapter 9: Pipe-and-Filter and Serverless Architecture 12. Part 3: Advanced Topics in Modern Software Development
13. Chapter 10: Security 14. Chapter 11: Observability 15. Chapter 12: Testing 16. Chapter 13: Performance and Optimizations 17. Chapter 14: Orchestration with Kubernetes 18. Chapter 15: Continuous Integration and Continuous Deployment 19. Index 20. Other Books You May Enjoy

Security

This chapter focuses on essential security practices in software development, emphasizing the importance of integrating security from its conception. It explores principles such as encryption, authentication, and authorization and techniques to safeguard data at rest and in transit. The chapter highlights common threats such as denial-of-service (DoS) attacks, input injection, output encoding, cross-site request forgery (CSRF), and cross-site scripting (XSS) and discusses defense mechanisms to avoid them.

The chapter also introduces security frameworks, including Zero Trust Architecture (ZTA), threat modeling, and the Open Worldwide Application Security Project (OWASP).

In addition, the chapter provides an in-depth discussion of Open Authorization 2.0 (OAuth2) and OpenID Connect (OIDC) for securing user authentication and authorization with a practical implementation utilizing Spring Authorization Server.

This chapter covers the following:

  • Reviewing key security...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Visually different images