>
>
>  Some topics I'd be interested in:
>> - Application security, authentication and authorization- best practices
>> with several popular frameworks
>>
>
> Several popular frameworks? Which ones?
>

I'd say the most popular ones are Shiro and Spring Security. So far I have
only rolled my own based on the blog article by Howard a while ago.
I see questions about authentication/authorization in Tapestry popup quite
a bit so it deserves some attention, since pretty much any application
requires it and it would really help if some popular solutions are
explained in one place.



> This is already covered in Igor's book, so I'm not sure my one really
> needs to talk about it too. Anyway, using Spring beans in Tapestry-IoC is
> easy.
>

To me it makes sense to at least show an example in a book because it is
such a popular choice and so many people are familiar with it. I must admit
I haven't read all of Igor's book yet. Sadly most of the projects that pay
the bills for me do not include any Tapestry, so that book keeps getting
pushed to the bottom of the stack, even though I really like what I have
read so far.


regards,

Onno

Reply via email to