This book serves as a practical reference to the design, development and deployment of applications that is resilient against hacker attacks. Topics covered focus not only on the defensive aspects of building hacker-resilient applications but also on the attacks that are prevalent in the software industry, so that the reader understands the anatomy of attacks before understanding how to mitigate risks that arise from those attacks. In addition to covering the technical aspects of application security issues, this book takes a holistic and comprehensive approach to covering the people, processes, and technology aspects of application security.