Architecture of Web applications

Explain the architecture of Web applications Describe the objectives of Web application hacking Explain the anatomy of an attack Describe Web application threats Explain countermeasures Describe Web application hacking tools