Contents contributed and discussions participated by kuni katsuya
What Is The @Interceptors Overhead? : Adam Bien's Weblog - 0 views
-
What Is The @Interceptors Overhead?
-
two, empty, interceptors
-
TypeAverageMinMaxTransactions/Sec Plain EJB 3.11082833.66 Intercepted EJB 3.11092818.88
- ...1 more annotation...
Quartz Resource Adapter usage - 0 views
Why Service Isn't A ServiceFacade, But ServiceFacade Is Sometimes A Service... : Adam B... - 0 views
-
boundary, which main responsibilities are:Providing coarser granularityEnsuring consistencyProviding a defined entry point which can be easily decorated with aspects / interceptorsExposure of components (what components are we will cover later) functionality to remote clients via IIOP, REST, SOAP, JMS, Hessian etc...
-
ServiceFacade - the facade to Services. The Services just rely on a certain amount of cross cutting aspects and concentrate on the realization of business logic
-
only invokes Services in consistent way, mostly using transactions
- ...2 more annotations...
Enterprise JavaBeans 3.1 with Contexts and Dependency Injection: The Perfect Synergy - 0 views
-
EJB beans cannot be directly exposed to JSF or JSP without a little help from CDI
-
CDI doesn't provide any transactional, monitoring, or concurrency aspect out of the box
-
stateless EJB 3.1 bean as boundary (Facade)
- ...1 more annotation...
Frequently Answered Questions (FAQ) - 0 views
-
1.3.What Java and Spring Framework versions are required?
-
Spring Security 3.0 and 3.1 require at least JDK 1.5
-
and also require Spring 3.0.3 as a minimum
6. Technical Overview - 0 views
Appendix C. Spring Security Dependencies - 0 views
-
Spring Security Dependencies
-
This appendix provides a reference of the modules in Spring Security and the additional dependencies that they require in order to function in a running application
-
C.1 spring-security-coreThe core module must be included in any project using Spring Security.
- ...8 more annotations...
Spring Security - Features - 0 views
-
Domain object instance security: In many applications it's desirable to define Access Control Lists (ACLs) for individual domain object instances. We provide a comprehensive ACL package with features including integer bit masking, permission inheritance (including blocking), an optimized JDBC-backed ACL repository, caching and a pluggable, interface-driven design.
-
OpenID Support: the web's emerging single sign-on standard (supported by Google, IBM, Sun, Yahoo and others) is also supported in Spring Security
-
Easy integration with existing databases: Our implementations have been designed to make it easy to use your existing authentication schema and data (without modification). Of course, you can also provide your own Data Access Object if you wish. Password encoding: Of course, passwords in your authentication repository need not be in plain text. We support both SHA and MD5 encoding, and also pluggable "salt" providers to maximise password security.
- ...5 more annotations...
JAAS Reference Guide - 0 views
Authentication Cheat Sheet - OWASP - 0 views
-
Authentication Cheat Sheet
-
Sessions should be
-
unique per user
- ...26 more annotations...
SQL Injection Prevention Cheat Sheet - OWASP - 0 views
-
SQL Injection Prevention Cheat Sheet
-
it is EXTREMELY simple to avoid SQL Injection vulnerabilities in your code.
-
create dynamic database queries that include user supplied input
- ...19 more annotations...
Access Control Cheat Sheet - OWASP - 0 views
Password Storage Cheat Sheet - OWASP - 0 views
graniteds_builder/src/org/granite/generator/template at master · graniteds/gr... - 0 views
-
remote.gsp
-
remoteBase.gsp
Chapter 16. Extensibilty - 0 views
-
16.2. Writing a Security Service
-
login(Object credentials)
-
authorize(AbstractSecurityContext context)
- ...20 more annotations...
« First
‹ Previous
741 - 760 of 1268
Next ›
Last »
Showing 20▼ items per page