The document discusses session hijacking in Java EE applications. It begins with an introduction to the speaker and agenda. It then covers the basics of HTTP sessions and the OWASP top 10 risk of session hijacking. The bulk of the document demonstrates through code examples four ways to hijack sessions: exposing the session ID in the URL, sniffing network traffic to obtain the session cookie, using cross-site scripting to steal the cookie, and cross-site request forgery. It discusses best practices for secure session management in Java EE, such as using HTTPS, changing session IDs after login, and using anti-CSRF tokens. The conclusion emphasizes that complete security is not possible and the importance of continuous learning.