California State Polytechnic University, Pomona

Query String Manipulation. Form Field Manipulation. Cookie Manipulation. HTTP Header Manipulation 7 Cryptography. Key Generation and Management. Custom Encryption. Checksum Spoofing 8 Exception Management. Exception Handling. Information Disclosure. Denial of Service. 9 Secured Data Management. Access to Data Store and Data Tampering. Secured ... ................
................