The book Spring Security 3 will be a good resource for you if you are looking for a security solutions based on Spring Security technology. It will guide you through a variety of topics explained with different levels of complexity providing you with a possibility to either stay with an initial understanding of an explained solution to a given problem or continue further with a more detailed and elaborated description .
The book covers main security topics including authentication and authorization presenting different set of options Spring Security provides to configure your application; among them are page and method access control using dedicated JSP tags and annotations, application of the spring expression language (SpEL) for security configurations, exception and event handling. The book will further instruct you on how to enhance your application to improve user experience by customising login/logout pages or configuring remember me functionality. In addition, it elaborates on such topics as session fixation protection, concurrent session control, password hashing, access control list or database-backed authentication.
If you are not familiar with Spring Security and would like to learn how this technology addresses the main security topics then the first five-six chapter will provide you with a good explanation to more common problems. On the other hand, if you a looking for a more specific solutions based on Spring Security, such as single-sign-on based on Central Authentication Service (CAS), LDAP configuration, trusted identity management with OpenID, client certificate authentication, spring security extensions using Kerberos then you may want to study the second part of the book, which will serve you as a good reference to a more specific topics.