This chapter covers
■ Introducing Spring Security
■ Securing web applications using servlet filters
■ Authentication against databases and LDAP
■ Transparently securing method invocations
转载于:https://www.cnblogs.com/zhtf2014/archive/2010/07/05/1771670.html