Get a comprehensive overview of Spring, the enterprise application framework and inversion-of-control (IOC) container for Java. This is an intermediate-level introduction intended for experienced Java developers.
- [Jordan] Hi, this is Jordan Scott, computer engineering expert. This course provides an overview of the integration of physical and digital security and the effects it could have. We'll begin with an introduction and then we'll look at what physical security is, followed by digital security. After that, I'll go over some integration aspects and examples. Then we'll explore the impact that complacency and policy has. This can significantly impact physical or digital security.
And then, of course, we'll end with a conclusion. Now let's get started. Welcome. I've been a war fighter or supported war fighters for over a decade. As one of the first operational army electronic warfare officers since the Cold War, I gained some very unique experience with respect to information warfare. I'm a Master of Science in Computer Engineering, open source and collaboration proponent, technology integrator, and proven innovator.
I've worked in additional environments such as Global Positioning System, missile defense, software development, system of systems integration, and cybersecurity. I've earned a Security+, my CISSP, and am active member of the Association of Old Crows and IEEE. Oh, and I brew beer in my spare time assuming I ever have any. Ready? Here we go.
Note: This course was recorded and produced by Mentor Source, Inc. We're pleased to host this training in our library.
- Introduction to Spring
- Configuring the ApplicationContext
- Using the Spring expression language
- Configuring proxies
- Autowiring beans
- Using lifecycle methods
- Configuring beans with XML
- Understanding the initialization phases of the bean lifecycle
- Aspect-oriented programming and Spring