10_File_and_Resource_Attacks.pdf
11_Other_Attacks.pdf
12_Web_Services.pdf
13_XPath.pdf
14_Penetration_Testing_CMS.pdf
15_Penetration_Testing_NoSQL_Databases.pdf
1_Penetration_Testing_Process.pdf
2_Introduction.pdf
3_Information_Gathering.pdf
4_Cross_Site_Scripting.pdf
10_File_and_Resource_Attacks.pdf