Chapter 10. E-Shoplifting

 

The broadest and most prevalent error requires the most disinterested virtue to sustain it.

 
 --Henry David Thoreau (1817–1862)

Introduction

In the beginning, computer systems were installed to manage back-end operations and support employees in their daily tasks. As technology evolved and systems became cheaper to deploy, businesses started using computers more and more in the management of their operations. By the early 1990s, computers and computer networks had become the information backbone of most enterprises, hosting a myriad of applications that even handled complex business logic.

As Internet availability and use increased, information dissemination via the Web became very popular. It allowed small and medium-sized ...

Get Web Hacking: Attacks and Defense now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.