Describes how hackers break into Web applications, what function areas are vulnerable, and how to guard against attacks.