Learn techniques that can be used to find the technologies (servers, software, frameworks) behind a web application. Many of these techniques can be used to gather information on web applications you do not have direct access to.
Learn to develop and deploy a number of powerful exploits which are effective means of hacking many web applications on the internet today.
Tie together the rest of the book using the recently aquired history, recon and offense knowledge to build and deploy mitigations and defenses that protect your application against all of the aforementioned attacks. Additionally learn best practices and methodologies for writing more secure code that can be integrated into any application.
You learn more about Andrew via his blog or connect with him on LinkedIn.
Angela Rufino - Content Development Editor @ O'Reilly Media
Jennifer Pollock - Senior Content Acquisitions Editor @ O'Reilly Media
Sonia Saruba - Senior Technical Editor @ O'Reilly Media
August Detlefsen - Security Architect @ Salesforce.com
Tim Gallo - Security Architect @ FireEye
Chetan Karande - Security Director @ DTCC
Ryan Flood - Senior Security Engineer @ AirBnB
Allan Liska - Threat Intelligence Analyst @ Recorded Future