Content:
Introduction
Why Detecting Web Attacks Important
OWASP
How Web Applications Work
Detecting SQL Injection Attacks
Detecting Cross Site Scripting (XSS) Attacks
Detecting Command Injection Attacks
Detecting Insecure Direct Object Reference (IDOR) Attacks
Detecting RFI and LFI Attacks