Getting Started
Nature and Scope of the Problem
Understanding Filtering, Validation,
and Output Escaping
Preventing the Most
Common Forms of Attack
Protecting Against Common
Website Vulnerabilities
Protecting Against
SQL Injection Attacks
About the Author
What is the threat?
What are the consequences when a
website is not protected against attack?
What are the most common forms of attack?
What are the most common vulnerabilities
attackers can exploit?
Are there any resources to help?
LAB: Hacking into SweetsComplete
+
o
-