Readers' comments (4)
This discussion is now locked
Posted by David Brunstein on 17 October 2012 at 13:11 Hi, The book coverage is awesome, and the details and examples really clarify the concepts. I'd like to see "common" error messages on each section or maybe an specific section for error messages. For example, I'm currently facing "JMSWMQ2013: The security authentication ..." when providing an authorized user id and connecting in binding mode. A minor detail "Wen a user or application..." The word when has missing the "h" at the beginning of page 28. Thank you, David Winnipeg, MB |
Posted by Mr. Hrvoje Djurdjevic on 12 March 2013 at 11:09 Hi, please replace "define chlauth" with "set chlauth" throughout the book. |
Posted by Mr. Louis Vahamonde on 2 April 2013 at 10:08 This book has been very helpful, particularly to a security novice like myself. Very clear and informative. Well done. |
Posted by Mr. T.Robert Wyatt on 3 April 2013 at 17:16 Thanks for the comments and typo alerts! We have updated the online version of the book to address the issues found and re-posted it. David, unfortunately, we weren't able to introduce significant new content with this revision but I do hope to fund a larger revision in which we'd add some new scenarios. If we get that funded, I'll see about adding a troubleshooting and/or common errors chapter. |