Content deleted Content added
m Spacing wrt refs |
Fixed typo in Modules section for the Data access item |
||
Line 63:
* [[Authentication]] and [[authorization]]: configurable security processes that support a range of standards, protocols, tools and practices via the [[Spring Security]] sub-project (formerly Acegi Security System for Spring).{{sfn|Johnson|Höller|Arendsen|Risberg|2005|loc=Acegi Security System for Spring}}{{sfn | Deinum | Long | Mak | Rubio | 2014 | loc=§7 Spring Security | p=331}}
* [[Convention over configuration]]: a rapid application development solution for Spring-based enterprise applications is offered in the [[Spring Roo]] module.
* [[Data access]]: working with [[RDBMS|relational database management systems]] on the Java platform using [[Java Database Connectivity]] (JDBC){{sfn|Walls|2019|pp=56-59}} and [[object-relational mapping]] tools and with [[NoSQL]]{{sfn | Deinum | Long | Mak | Rubio | 2014 | loc=§10 Data Access | pp=419-426}} databases. The <code>spring-jdbc</code> is an artifact found in the JDBC module
* [[Inversion of control]] container: configuration of application components and lifecycle management of Java objects, done mainly via [[dependency injection]].{{sfn|Johnson|Höller|Arendsen|Risberg|2005|loc=Chapter §2 - The Bean Factory and ApplicationContext}}
* Messaging: declarative registration of message listener objects for transparent message-consumption from [[message queue]]s via [[Java Message Service]] (JMS), improvement of message sending over standard JMS APIs.{{sfn | Deinum | Long | Mak | Rubio | 2014 | loc=§15-4 Create Message-Driven POJOs in Spring | pp=677-681}}
|