Brief Table of Contents

Copyright

About the Authors

Introduction

Chapter 1. Cross-Site Scripting

Chapter 2. Cross-Site Request Forgery

Chapter 3. Structured Query Language Injection

Chapter 4. Server Misconfiguration and Predictable Pages

Chapter 5. Breaking Authentication Schemes

Chapter 6. Logic Attacks

Chapter 7. Web of Distrust