This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites and the authors give solid practical advice on how to identify and mitigate these threats. It shows how hackers perform reconnaissance choose their entry point and attack Web 2.0 based services and reveals detailed countermeasures and defense techniques.
No customer reviews for the moment.

