Programming Securely
Article on Validating Input from IBM’s Best Practices series
Top Ten Web Security Flaws –
OWASP
Know your Enemy: Web Application Threats
– Using Honeypots to learn about
HTTP
-based attacks
Revision #2
Created Sun, Apr 30, 2006 11:55 PM by Franks, Mike
Updated Mon, Feb 26, 2007 12:54 AM by Franks, Mike