I would like to know if your book covers security integration with various AJAX frameworks. I quickly go through the TOC but could not spot it. Actually, in my current project we are facing some issue regarding integration of security 2.4 and DWR. so I wonder if your book covers this.
Thank you for writing book. It surely takes lots of effort.
Actually, I did have coverage of AJAX techniques in the original outline for the book, but as I started exploring what I would need to cover, and the depth I would need to cover it (since many people really don't understand how AJAX works in the first place), it seemed like it would distract from the focus of the book, which was on the framework features and design itself. I would hope that if you were to read the book, you would have a better understanding of how to wire up AJAX in a secure fashion, even if it's not explicitly covered in the step-by-step approach that works effectively throughout the other examples in the book.
Maybe I should write a "Integrating Spring Security 3" book next
Author, Spring Security 3 (the Book), Packt Publishing, 2010