It covers security fundamentals and leads the reader through the Web site assessment procedure.
This book explains how to create specific follow-up tests that concentrate on potential security flaws and how to assess findings.
It teaches the procedures for finding, scanning for, assessing, and correcting vulnerabilities.