Summary
Having reached the end of this chapter, which is the last chapter of the book, we are now able to deploy a Java EE public solution with at least some level of security. Indeed, through this chapter, readers become aware of a specification allowing them to restrict access to the forms. However, it is important to note that we have just dealt with one small aspect of security, given the objectives of this book. We ask you to complete your knowledge about security with additional reading. This is because the domain is made up of several aspects such as the transmission of data across the network, method execution, construction, and execution of SQL queries.