This is a book that will not only aid you in learning how to defend your web application
against hackers, but will also walk you through the steps hackers take in order to
investigate and break into a web application.
Throughout this book we will discuss many techniques that hackers are using today to
break into web applications hosted by corporations, governments, and occasionally
even hobbyists.
Following sufficient investigation into the previously mentioned techniques, we begin
a discussion on how to secure web applications against these hackers.