• Complain

Dennis Byrne - Full Stack Python Security: Cryptography, TLS, and attack resistance

Here you can read online Dennis Byrne - Full Stack Python Security: Cryptography, TLS, and attack resistance full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Manning Publications, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Dennis Byrne Full Stack Python Security: Cryptography, TLS, and attack resistance
  • Book:
    Full Stack Python Security: Cryptography, TLS, and attack resistance
  • Author:
  • Publisher:
    Manning Publications
  • Genre:
  • Year:
    2021
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Full Stack Python Security: Cryptography, TLS, and attack resistance: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Full Stack Python Security: Cryptography, TLS, and attack resistance" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Full Stack Python Security teaches you everything youll need to build secure Python web applications.Summary In Full Stack Python Security: Cryptography, TLS, and attack resistance, youll learn how to: Use algorithms to encrypt, hash, and digitally sign data Create and install TLS certificates Implement authentication, authorization, OAuth 2.0, and form validation in Django Protect a web application with Content Security Policy Implement Cross Origin Resource Sharing Protect against common attacks including clickjacking, denial of service attacks, SQL injection, cross-site scripting, and moreFull Stack Python Security: Cryptography, TLS, and attack resistance teaches you everything youll need to build secure Python web applications. As you work through the insightful code snippets and engaging examples, youll put security standards, best practices, and more into action. Along the way, youll get exposure to important libraries and tools in the Python ecosystem. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the technology Security is a full-stack concern, encompassing user interfaces, APIs, web servers, network infrastructure, and everything in between. Master the powerful libraries, frameworks, and tools in the Python ecosystem and you can protect your systems top to bottom. Packed with realistic examples, lucid illustrations, and working code, this book shows you exactly how to secure Python-based web applications.About the bookFull Stack Python Security: Cryptography, TLS, and attack resistance teaches you everything you need to secure Python and Django-based web apps. In it, seasoned security pro Dennis Byrne demystifies complex security terms and algorithms. Starting with a clear review of cryptographic foundations, youll learn how to implement layers of defense, secure user authentication and third-party access, and protect your applications against common hacks.Whats inside Encrypt, hash, and digitally sign data Create and install TLS certificates Implement authentication, authorization, OAuth 2.0, and form validation in Django Protect against attacks such as clickjacking, cross-site scripting, and SQL injectionAbout the reader For intermediate Python programmers.About the authorDennis Byrne is a tech lead for 23andMe, where he protects the genetic data of more than 10 million customers.Table of Contents 1 Defense in depth PART 1 - CRYPTOGRAPHIC FOUNDATIONS 2 Hashing 3 Keyed hashing 4 Symmetric encryption 5 Asymmetric encryption 6 Transport Layer Security PART 2 - AUTHENTICATION AND AUTHORIZATION 7 HTTP session management 8 User authentication 9 User password management 10 Authorization 11 OAuth 2 PART 3 - ATTACK RESISTANCE 12 Working with the operating system 13 Never trust input 14 Cross-site scripting attacks 15 Content Security Policy 16 Cross-site request forgery 17 Cross-Origin Resource Sharing 18 Clickjacking

Dennis Byrne: author's other books


Who wrote Full Stack Python Security: Cryptography, TLS, and attack resistance? Find out the surname, the name of the author of the book and a list of all author's works by series.

Full Stack Python Security: Cryptography, TLS, and attack resistance — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Full Stack Python Security: Cryptography, TLS, and attack resistance" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Full Stack Python Security Cryptography TLS and attack resistance Dennis - photo 1

Full Stack Python Security Cryptography TLS and attack resistance - image 2

Full Stack Python Security

Cryptography, TLS, and attack resistance

Dennis Byrne

To comment go to liveBook

Full Stack Python Security Cryptography TLS and attack resistance - image 3

Manning

Shelter Island

For more information on this and other Manning titles go to

www.manning.com

Copyright

For online information and ordering of these and other Manning books, please visit www.manning.com. The publisher offers discounts on these books when ordered in quantity.

For more information, please contact

Special Sales Department

Manning Publications Co.

20 Baldwin Road

PO Box 761

Shelter Island, NY 11964

Email: orders@manning.com

2021 by Manning Publications Co. All rights reserved.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by means electronic, mechanical, photocopying, or otherwise, without prior written permission of the publisher.

Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in the book, and Manning Publications was aware of a trademark claim, the designations have been printed in initial caps or all caps.

Recognizing the importance of preserving what has been written, it is Mannings policy to have the books we publish printed on acid-free paper, and we exert our best efforts to that end. Recognizing also our responsibility to conserve the resources of our planet, Manning books are printed on paper that is at least 15 percent recycled and processed without the use of elemental chlorine.

Full Stack Python Security Cryptography TLS and attack resistance - image 4

Manning Publications Co.

20 Baldwin Road Technical

PO Box 761

Shelter Island, NY 11964

Development editor:

Toni Arritola

Technical development editor:

Michael Jensen

Review editor:

Aleks Dragosavljevi

Production editor:

Andy Marinkovich

Copy editor:

Sharon Wilkey

Proofreader:

Jason Everett

Technical proofreader:

Ninoslav Cerkez

Typesetter:

Marija Tudor

Cover designer:

Marija Tudor

ISBN: 9781617298820

front matter
preface

Years ago, I searched Amazon for a Python-based application security book. I assumed there would be multiple books to choose from. There were already so many other Python books for topics such as performance, machine learning, and web development.

To my surprise, the book I was searching for didnt exist. I could not find a book about the everyday problems my colleagues and I were solving. How do we ensure that all network traffic is encrypted? Which frameworks should we use to secure a web application? What algorithms should we hash or sign data with?

In the years to follow, my colleagues and I found the answers to these questions while settling upon a standard set of open source tools and best practices. During this time, we designed and implemented several systems, protecting the data and privacy of millions of new end users. Meanwhile, three competitors were hacked.

Like everyone else in the world, my life changed in early 2020. Every headline was about COVID-19, and suddenly remote work became the new normal. I think its fair to say each person had their own unique response to the pandemic; for myself, it was severe boredom.

Writing this book allowed me to kill two birds with one stone. First, this was an excellent way to stave off boredom during a year of pandemic lockdowns. As a resident of Silicon Valley, this silver lining was amplified in the fall of 2020. At this time, a spate of nearby wildfires destroyed the air quality for most of the state, leaving many residents confined to their homes.

Second, and more importantly, it has been very satisfying to write the book I could not buy. Like so many Silicon Valley startups, a lot of books begin for the sole purpose of obtaining a title such as author or founder. But a startup or book must solve real-world problems if it will ever produce value for others.

I hope this book enables you to solve many of your real-world security problems.

acknowledgments

Writing entails a great deal of solitary effort. It is therefore easy to lose sight of who has helped you. Id like to acknowledge the following people for helping me (in the order in which I met them).

To Kathryn Berkowitz, thank you for being the best high-school English teacher in the world. My apologies for being such a troublemaker. To Amit Rathore, my fellow ThoughtQuitter, thank you for introducing me to Manning. Id like to thank Jay Fields, Brian Goetz, and Dean Wampler for their advice and input while I was searching for a publisher. To Cary Kempston, thank you for endorsing the auth team. Without real-world experience, I would have had no business writing a book like this. To Mike Stephens, thank you for looking at my original manuscript and seeing potential. Id like to thank Toni Arritola, my development editor, for showing me the ropes. Your feedback is greatly appreciated, and with it Ive learned so much about technical writing. To Michael Jensen, my technical editor, thank you for your thoughtful feedback and quick turnaround times. Your comments and suggestions have helped make this book a success.

Finally, Id like to thank all the Manning reviewers who gave me their time and feedback during the development phase of this effort: Aaron Barton, Adriaan Beiertz, Bobby Lin, Daivid Morgan, Daniel Vasquez, Domingo Salazar, Grzegorz Mika, Hvard Wall, Igor van Oostveen, Jens Christian Bredahl Madsen, Kamesh Ganesan, Manu Sareena, Marc-Anthony Taylor, Marco Simone Zuppone, Mary Anne Thygesen, Nicolas Acton, Ninoslav Cerkez, Patrick Regan, Richard Vaughan, Tim van Deurzen, Veena Garapaty, and William Jamir Silva, your suggestions helped make this a better book.

about this book

I use Python to teach security, not the other way around. In other words, as you read this book, you will learn much more about security than Python. There are two reasons for this. First, security is complicated, and Python is not. Second, writing volumes of custom security code isnt the best way to secure a system; the heavy lifting should almost always be delegated to Python, a library, or a tool.

This book covers beginner- and intermediate-level security concepts. These concepts are implemented with beginner-level Python code. None of the material for either security or Python is advanced.

Who should read this book

All of the examples in this book simulate the challenges of developing and securing systems in the real world. Programmers who push code to production environments are therefore going to learn the most. Beginner Python skills, or intermediate experience with any other major language, is required. You certainly do not have to be a web developer to learn from this book, but a basic understanding of the web makes it easier to absorb the second half.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Full Stack Python Security: Cryptography, TLS, and attack resistance»

Look at similar books to Full Stack Python Security: Cryptography, TLS, and attack resistance. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Full Stack Python Security: Cryptography, TLS, and attack resistance»

Discussion, reviews of the book Full Stack Python Security: Cryptography, TLS, and attack resistance and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.