- This Notes are from the web application hacker's handbook i had read
- This is based on what i understand from the book, and point to remember so after some time i can see and remember
- if any mistakes there, i apologize for that...
My nots from Web application Hacker's Handbook
My nots from Web application Hacker's Handbook