Cyberattacks are becoming more commonplace and the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in their access control alone. Attacks evolve to work around new defenses, and defenses must evolve to remain effective. Developers need to understand the fundamentals of attacks and defenses in order to comprehend new techniques as they become available. This book teaches you how to write secure web applications.
The focus is highlighting how hackers attack applications along with a broad arsenal of defenses. This will enable you to pick appropriate techniques to close vulnerabilities while still providing users with their needed functionality.
Topics covered include:
A framework for deciding what needs to be protected and how strongly
Configuring services such as databases and web servers
Safe use of HTTP methods such as GET, POST, etc, cookies and use of HTTPS
Table of Contents
1. Introduction
2. The Hands-On Environment
3. Threat Modelling
4. Transport and Encryption
5. Installing and Configuring Services
6. APIs and Endpoints
7. Cookies and User Input
8. Cross-Site Requests
9. Password Management
10. Authentication and Authorization
11. OAuth2
12. Logging and Monitoring
13. Third-Party and Supply Chain Security
14. Further Resources.