ABSTRACT

Contents 12.1 Overview .....................................................................................................................281 12.2 Needs and Anti-Breach Strategies ............................................................................... 282 12.3 Databases: From Data to Knowledge to Wisdom ....................................................... 285 12.4 Web Application Attacks ............................................................................................ 289

12.4.1 Passive Attacks ............................................................................................. 290 12.4.2 Active Attacks ...............................................................................................291