After reading this chapter and completing the activities, you will be able to:
Describe Web applications
Explain Web application vulnerabilities
Describe the tools used to attack Web servers
Companies recognize the power of the Web to improve sales and the necessity of having a Web presence. For this reason, Web applications are widely used, and many Web development platforms are available, such as Microsoft Active ...