ABSTRACT

Contents 17.1 Introduction ................................................................................................................... 344 17.2 Web Applications’ Security Weaknesses ..........................................................................345