ContentsAcknowledgmentsxiiiAbouttheAuthorsxvPartIWebDevelopmentIsaBloodSport—Don'tWanderontotheFieldWithoutaHelmet1Chapter1SecurityIsaServerIssueandOtherMyths3RealityCheck3SecurityIsaServerIssue5HackersGainControlThroughInsecureApplications5ProgrammersCanHardenTheirOwnAppl