Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. This title takes a look at common Web infrastructure & security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems.