O'Reilly logo

J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice by Pankaj Kumar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Comprehensive Security

In the year 2000, the “I LOVE YOU” virus propagated through email and infected millions of Outlook users. This could not have been prevented, even if Outlook was written in Java and used all the security techniques explained in this book. The virus exploited design flaws in the Outlook client, which made it possible to run dangerous code with the privileges of authenticated users without adequate warning to the user. Other examples of design flaws include: hidden security sensitive information, default configuration with security options disabled, complex set of procedures to enable security, revealing too much information about internal workings of the system, and so on.

In early 2003, the Slammer worm exploited buffer ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required