Programming Securely
Article on Validating Input from IBM’s Best Practices series
Top Ten Web Security Flaws –
OWASP
Know your Enemy: Web Application Threats
– Using Honeypots to learn about
HTTP
-based attacks
Revision #2
Created 2006-04-30 23:55:10 UTC by Franks, Mike
Updated 2007-02-26 00:54:49 UTC by Franks, Mike