• 1 Know your enemy
  • 2 Browser security
  • 3 Encryption
  • 4 Web server security
  • 5 Security as a process
  • 6 Browser vulnerabilities
  • 7 Network vulnerabilities
  • 8 Authentication vulnerabilities
  • 9 Session vulnerabilities
  • 10 Authorization vulnerabilities
  • 11 Payload vulnerabilities
  • 12 Injection vulnerabilities
  • 13 Vulnerabilities in third-party code
  • 14 Being an unwitting accomplice
  • 15 What to do when you get hacked