Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Java EE 7 Development with WildFly

You're reading from   Java EE 7 Development with WildFly Leverage the power of the WildFly application server from JBoss to develop modern Java EE 7 applications

Arrow left icon
Product type Paperback
Published in Dec 2014
Publisher
ISBN-13 9781782171980
Length 434 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Toc

Table of Contents (16) Chapters Close

Preface 1. Getting Started with WildFly FREE CHAPTER 2. Your First Java EE Application on WildFly 3. Introducing Java EE 7 – EJBs 4. Learning Context and Dependency Injection 5. Combining Persistence with CDI 6. Developing Applications with JBoss JMS Provider 7. Adding Web Services to Your Applications 8. Adding WebSockets 9. Managing the Application Server 10. Securing WildFly Applications 11. Clustering WildFly Applications 12. Long-term Tasks' Execution 13. Testing Your Applications A. Rapid Development Using JBoss Forge Index

Securing the transport layer

If you were to create a mission-critical application with just the bare concepts you learned until now, you would be exposed to all sorts of security threats. For example, if you need to design a payment gateway, where the credit card information is transmitted by means of an EJB or servlet, using just the authorization and authentication stack is really not enough, as the sensitive information is still sent across a network and it could be disclosed by a hacker.

In order to prevent disclosure of critical information to unauthorized individuals or systems, you have to use a protocol that provides encryption of the information. Encryption is the conversion of data into a form that cannot be understood by unauthorized people. Conversely, decryption is the process of converting encrypted data back into its original form so that it can be understood.

The protocols used to secure the communication are SSL and TLS, the latter being considered a replacement for the older...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image