• Complain

Matthew Baker - Secure Web Application Development: A Hands-On Guide with Python and Django

Here you can read online Matthew Baker - Secure Web Application Development: A Hands-On Guide with Python and Django full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: Apress, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Matthew Baker Secure Web Application Development: A Hands-On Guide with Python and Django
  • Book:
    Secure Web Application Development: A Hands-On Guide with Python and Django
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2022
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Secure Web Application Development: A Hands-On Guide with Python and Django: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Secure Web Application Development: A Hands-On Guide with Python and Django" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Cyberattacks are becoming more commonplace and the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in their access control alone. Attacks evolve to work around new defenses, and defenses must evolve to remain effective. Developers need to understand the fundamentals of attacks and defenses in order to comprehend new techniques as they become available. This book teaches you how to write secure web applications.
The focus is highlighting how hackers attack applications along with a broad arsenal of defenses. This will enable you to pick appropriate techniques to close vulnerabilities while still providing users with their needed functionality.

Topics covered include:

  • A framework for deciding what needs to be protected and how strongly
  • Configuring services such as databases and web servers
  • Safe use of HTTP methods such as GET, POST, etc, cookies and use of HTTPS
  • Safe REST APIs
  • Server-side attacks and defenses such as injection and cross-site scripting
  • Client-side attacks and defenses such as cross-site request forgery
  • Security techniques such as CORS, CSP
  • Password management, authentication and authorization, including OAuth2
  • Best practices for dangerous operations such as password change and reset
  • Use of third-party components and supply chain security (Git, CI/CD etc)

What Youll Learn

  • Review the defenses that can used to prevent attacks
  • Model risks to better understand what to defend and how
  • Choose appropriate techniques to defend against attacks
  • Implement defenses in Python/Django applications
Who This Book Is For
  • Developers who already know how to build web applications but need to know more about security
  • Non-professional software engineers, such as scientists, who must develop web tools and want to make their algorithms available to a wider audience.
  • Engineers and managers who are responsible for their product/company technical security policy

Matthew Baker: author's other books


Who wrote Secure Web Application Development: A Hands-On Guide with Python and Django? Find out the surname, the name of the author of the book and a list of all author's works by series.

Secure Web Application Development: A Hands-On Guide with Python and Django — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Secure Web Application Development: A Hands-On Guide with Python and Django" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Secure Web Application Development Matthew Baker Secure Web - photo 1
Book cover of Secure Web Application Development
Matthew Baker
Secure Web Application Development
A Hands-On Guide with Python and Django
The Apress logo Matthew Baker Kaisten Aargau Switzerland ISBN - photo 2

The Apress logo.

Matthew Baker
Kaisten, Aargau, Switzerland
ISBN 978-1-4842-8595-4 e-ISBN 978-1-4842-8596-1
https://doi.org/10.1007/978-1-4842-8596-1
Matthew Baker 2022
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Apress imprint is published by the registered company APress Media, LLC, part of Springer Nature.

The registered company address is: 1 New York Plaza, New York, NY 10004, U.S.A.

To my children Harry and Alexander, who I hope will be the next generations innovators.

Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub.

Acknowledgments

No book is a one-man show, and this book would not have gone to print without the support and encouragement of those around me.

I would like to thank my team at ETH Zurich, especially Dr. Uwe Schmitt who is a wise and rational sounding board. I would like to thank the team at Apress for their structured and professional execution and for giving me so much freedom in authoring this book.

Thanks also to my brother, Julian Baker of Flat Earth Industries, for the graphics he supplied for this book (I especially like the skull earrings on Alice the Hacker).

Finally, and most importantly, I would like to thank my friends in Switzerland, my children, and my wife, Sevda, for their encouragement and for not complaining when I disappear for hours, or days, in front of my computers.

Table of Contents
About the Author
Matthew Baker
A photo of Matthew Baker is the Head of Scientific Software and Data - photo 3

A photo of Matthew Baker.

is the Head of Scientific Software and Data Management at ETH Zurich, Switzerlands leading science and technology university. He leads a team of engineers developing custom software to support STEM research projects, as well as teaches computer science short courses. Having over 25 years of experience developing software, he has worked as a developer, systems administrator, project manager, and consultant in various sectors from banking and insurance, science and engineering, to military intelligence.

He can be reached at matthew.baker@id.ethz.ch .

About the Technical Reviewer
Sean Wright
A photo of Sean Wright is an experienced application security engineer with - photo 4

A photo of Sean Wright.

is an experienced application security engineer with an origin as a software developer. He is primarily focused on web-based application security with a special interest in TLS and supply chainrelated subjects. He is experienced in providing technical leadership in relation to application security, as well as engaging with teams to improve the security of systems and applications that they develop and maintain. He is passionate about being a part of the community and giving back to the community. Additionally, he enjoys spending his personal time performing personal security-related research.
The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
M. Baker Secure Web Application Development https://doi.org/10.1007/978-1-4842-8596-1_1
1. Introduction
Matthew Baker
(1)
Kaisten, Aargau, Switzerland
1.1 About This Book

In 2009, hackers obtained user credentials of over 30 million users of mobile game publisher RockYou. They exploited a SQL injection vulnerability to obtain the sites user table. To make matters worse, passwords were stored unencrypted, allowing the hackers to obtain their passwords without further need to crack them.

In 2010, a developer released a Firefox extension called Firesheep that enabled eavesdroppers to obtain session IDs of Facebook and other sites logged in through the same Wi-Fi network. This enabled the eavesdropper to log in as that user without needing to enter a password.

In 2017, hackers obtained the records of over 130 million individuals from credit bureau Equifax. The vulnerability was in a web framework Equifax was using, Apache Struts. The vulnerability has already been identified and fixed by Apache, but at the time of the hack, Equifax had not updated to the patched version.

These three examples demonstrate that even large, often reputable organizations can get hacked. In each instance, the breach was preventable. In this book, we will look at the vulnerabilities that lead to these compromises, along with many others, and, of course, how to fix them.

Web application security is an ongoing war between hackers and developers. If we, as developers, simply learn techniques to make applications more secure, without understanding the attacks fully, hackers will find other vulnerabilities to exploit. Therefore, we must understand how hackers discover and exploit vulnerabilities. We must also understand why defenses work and what attacks they do and do not prevent.

Most importantly, we must use several techniques together and choose a set of defenses that fit with the requirements of our application while at the same time making our applications secure enough to prevent or minimize attack.

In this book, we will look at the vulnerabilities hackers exploit to compromise our systems and how they discover them. We will simulate the attacks through hands-on examples. In each case, we will look at techniques to close the vulnerability or reduce its impact. Again, through hands-on examples, we will see why these approaches prevent attacks as well as the vulnerabilities they do not address. By understanding the details of these techniques, you can use them together to make your applications more secure while still giving your users a sufficient quality of service.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Secure Web Application Development: A Hands-On Guide with Python and Django»

Look at similar books to Secure Web Application Development: A Hands-On Guide with Python and Django. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Secure Web Application Development: A Hands-On Guide with Python and Django»

Discussion, reviews of the book Secure Web Application Development: A Hands-On Guide with Python and Django and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.