Programming Securely Article on Validating Input from IBM’s Best Practices series Top Ten Web Security Flaws – OWASP Know your Enemy: Web Application Threats – Using Honeypots to learn about HTTP -based attacks