• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

SunShine on Java - Security Attacks - few questions

 
Ranch Hand
Posts: 3389
Mac MySQL Database Tomcat Server
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hello Natalie Sunny Wear,

Congratulations on your ebook (or echapter as it was addressed by Jeanne Boyarsky).

I have a few set of questions.

1. Have you intended this book on a particular version of Java EE? or in general?
2. The XSS, SQL Injection are pretty much explained everywhere. What way your book is going to differ ?
3. May be slightly off the track, have you included the issues like Double Submit Problem ? It is also one of the few prominent issues people tend to face.
4. Why only one chapter? Anything significant? any plans to increase few more chapters later?

Thanks in advance.
 
author
Posts: 17
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hello Muthu and thanks for your questions.

Q1. Have you intended this book on a particular version of Java EE? or in general?
A1. No specific version of JEE actually, just in general.

Q2. The XSS, SQL Injection are pretty much explained everywhere. What way your book is going to differ ?
A2. In my book, I created illustrations showing the multiple tiers where the attack occurs in addition to the explanations. The
various chapters address the 5 types of attacks.

Q3. May be slightly off the track, have you included the issues like Double Submit Problem ? It is also one of the few prominent issues people tend to face.
A3. I did not include nuances of attacks, though I separate XSS into 3 separate chapters to deal with the 3 types. I would like to, eventually, write another
ebook where I can include such variations of attacks, so thank you for the idea.

Q4. Why only one chapter? Anything significant? any plans to increase few more chapters later?
A4. There are, in fact, 5 chapters in the book, each with explanations, illustrations and code examples.
 
Raghavan Muthu
Ranch Hand
Posts: 3389
Mac MySQL Database Tomcat Server
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Thank you Sunny. Glad indeed to hear from you. Thanks for considering my suggestion.

Wish you good luck on your extended version of the book.
 
reply
    Bookmark Topic Watch Topic
  • New Topic