Publisher's Synopsis
- Identify security vulnerabilities
- Use some of the top security tools to identify holes
- Read reports from testing tools
- Spot and negate common attacks
- Identify common Web-based attacks and exposures as well as recommendations for closing those holes