• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

Iron Clad Java. Handling Fake request

 
Ranch Hand
Posts: 228
Java
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hii,

I read about the book summery which says like Defend against cross-site scripting, cross-site request forgery etc.
A common problem comes with website is load balancing. That may be overcome using more hardware, but does this book describes to identify the continuous incoming fake requests (May be obtained through a Javascript or something else) which increases the load on the server for no reason?
 
Rancher
Posts: 43081
77
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
What is a "fake request"?
 
Sheriff
Posts: 17644
300
Mac Android IntelliJ IDE Eclipse IDE Spring Debian Java Ubuntu Linux
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
If by "fake request" you mean a request made as part of a denial of service (DoS) attack, the book does make several references to denial of service attacks but I haven't had a chance to read it thoroughly to see if the authors go into DoS in detail. There's only one reference in the book to "load balancing" and it's in the context of CSRF defense.
 
Ishan Pandya
Ranch Hand
Posts: 228
Java
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Yes I meant DOS attack. Thank Junilu Lacar.
Does this book describes a third party tool or app for implementing all this security points as described in table of contents? or it is just done by using Core Servlets?
 
Junilu Lacar
Sheriff
Posts: 17644
300
Mac Android IntelliJ IDE Eclipse IDE Spring Debian Java Ubuntu Linux
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Yes, the book mentions a number of tools that can be used. More importantly though, security is about way more than just tools and the book does a good job of going into things like patterns and anti-patterns, design flaws, coding practices, and Java APIs that you can use to write more secure web applications.
 
reply
    Bookmark Topic Watch Topic
  • New Topic