1 Welcome to the Wide World of Web Application Security
PART II Web Application Security Principles
5 Browser Security Principles: The Same-Origin Policy
6 Browser Security Principles: Cross-Site Scripting and Cross-Site Request Forgery
7 Database Security Principles
PART III Secure Development and Deployment
9 Secure Development Methodologies
Epilogue The Wizard, the Giant, and the Magic Fruit Trees: A Happy Ending