
Introduction
By now, you should be asking yourself “Is there anything else I can do to secure my
Web applications against malicious hackers?” We have stepped back from the devel-
oper’s chair and looked at development as a hacker would see it. We have looked at
CGI Bin scripts and the vulnerabilities associated with them. We have had a chance
to examine Java and Java applets, XML, ActiveX, ColdFusion, and Mobile Code. We
have addressed almost every topic relevant to hack proofing your Web applications.
This last chapter ties all the previously discussed methods together, and introduces a
security plan. Very often, simple common sense will assist you ...