The security world is changing as the advent of modern Web 2.0 sites & rich Internet applications has given rise to a generation of hacking techniques. This book offers information on hacks that attempt to exploit technical flaws. It explains how to assess attacks against technologies in Internet applications & social networking sites.