I would like to know overall approach you used to write this book, are we going to build a web app adding more and more features as the chapters role by or several half baked simple apps showing limited functionality as the covered chapter permits?
I would like to ask, to what extent Spring Security is covered in the book, as off the bat Spring security gives support only for simple database table of username, password and role and if we have any other column on table it gets tricky.
Thanks, I checked your personal website and found out really interesting quotes, All the best to you to cross all your TODOs.
A feeble attempt to tell you about our stuff that makes us money
Devious Experiments for a Truly Passive Greenhouse!