ABSTRACT

Many of the chapters in this book are dedicated to explore the principles of web attack techniques and their solutions. For Internet companies, the eects of isolated vulnerabilities may be acceptable, but major security issues that aect the development of the company cannot be neglected.