...
Demonstrating the full range of security features that Java offers requires studying interaction of code with other components and frameworks. Occasionally, the coding guidelines use examples from popular web and application frameworks such as Spring and Struts and technologies such as Java Server Pages (JSP) to highlight a security vulnerability that cannot be studied examined in isolation. Only when the standard API provides no option to mitigate a vulnerability, are third-party libraries and solutions suggested.
...