web security

read Ch. 15

(further reading:
How to Break Web Software)