Data Science & Developer Roadmaps with Chat & Free Learning Resources
Web Application Security
Web applications can be attacked many ways by malicious actors. Learn more on Full Stack Python.
Read more at Full Stack Python | Find similar documentsHow to secure your web service
Photo by Karl Randay If you're including third-party content in your web pages, you can't stop a determined attacker. Browsers weren't designed with that scenario in mind, so by default any HTML you p...
Read more at Pete Warden's blog | Find similar documentsHow to Protect a Website From Threats
The main benefit of reading this article is that you will learn how to use commercial-grade encryption, prevent sensitive information leakage, and protect your customers, website, and web server from…...
Read more at Level Up Coding | Find similar documentsFive short links – Security edition
Photo by Darwin Bell Now I'm looking at handling more sensitive customer data I have an obligation to do everything I can to secure my server and code. Here's five resources I've found helpful: Nikto ...
Read more at Pete Warden's blog | Find similar documentsOWASP: Introduction to Web Application Security
OWASP | Security | Django| Web Development
Read more at Level Up Coding | Find similar documents6 Ways to Improve Your Web App’s Security Now
Technology agnostic mitigations for XSS, CSRF, RFD, CORS web app vulnerabilities based on the OWASP Top 10.
Read more at Level Up Coding | Find similar documentsSecurity for Drupal and related server software
Drupal is an open-source content management system with a quite complex architecture. It also has a strong security model. Thanks to the big community of developers there is a lot of informative…
Read more at Level Up Coding | Find similar documents9 Security Implications to Consider Before Deploying a Web App
Security checklist to protect web applications and Restful services against the most common attacks based on OWASP Top 10 Web Application Security Risks
Read more at Better Programming | Find similar documents6 Steps to Build Secure Web Applications
A high-level guide to getting security right for non-experts Photo by John Salvino on Unsplash Working as an independent sees me moving from project-to-project more often than folks with steady work ...
Read more at Level Up Coding | Find similar documents10 security tips for frontend developers
Web security is a topic that is often overlooked by frontend developers. When we assess the quality of the website, we often look at metrics like performance, SEO-friendliness, and accessibility…
Read more at Level Up Coding | Find similar documentsHow to design a secure web API access for your website?
How to design secure web API access for your website? When we open web API access to users, we need to make sure each API call is authenticated. This means the user must be who they claim to be. In th...
Read more at ByteByteGo Newsletter | Find similar documentsAdvanced Security - Intro
Advanced Security - Intro Additional Features There are some extra features to handle security apart from the ones covered in the Tutorial - User Guide: Security . Tip The next sections are not neces...
Read more at FastAPI Documentation | Find similar documentsLearn how to implement smart Authentication Redirects on your website
2. Restrict the user from accessing authentication-related pages like login, register, forgot password, etc… if they’re logged in.
Read more at Level Up Coding | Find similar documentsSecurity Practices In Coding
Let us start with the villains of the coding world — SQL injection and cross-site scripting (XSS). Imagine you have crafted an SQL query to fetch user data. Now, imagine a malicious user slipping in s...
Read more at Level Up Coding | Find similar documentsAdding Security to Your Code
A phrase I often hear is “security is everyone’s responsibility” but I notice that data scientists are frequently so focused on the vast number of skills that they need to know, that security goes…
Read more at Towards Data Science | Find similar documentsWeb3 is our opportunity for a better and safer Internet — Evolution of Web
The web as we use it today results from its evolution over so many years, just like “Rome wasn’t built in a day”, so was the internet. Most people tend to divide this evolution into 3 stages — Web…
Read more at Level Up Coding | Find similar documentsJava for Web Application Development: Here’s Everything You Need to Know
We have stepped into the modern world, and the world wide web is a central part of it. With every space getting digitized, the internet has become one of the necessities.Websites and web pages are one...
Read more at Javarevisited | Find similar documentsSecurity in Django
This document is an overview of Django’s security features. It includes advice on securing a Django-powered site. Cross site scripting (XSS) protection XSS attacks allow a user to inject client side s...
Read more at Django documentation | Find similar documentsHacking the Web With SQL Injections
Focus on SQL Injections, PHP, and the Diwa Project Photo by Caspar Camille Rubin on Unsplash I always wanted to be a hacker. For 6 years, I have written applications in Php, JavaScript, and Python. D...
Read more at Better Programming | Find similar documentsAuthenticating HTTP Requests in Modern Web Apps
Ensuring a user is authenticated is an essential part of creating a modern web application. Today, we’ll be looking at a common approach using JWT access and refresh tokens with Axios.
Read more at Level Up Coding | Find similar documents21 Best Practices for Handling Passwords in Web Applications
Passwords are like keys to your system. So, If you are a sincere web developer, it’s your responsibility to ensure its strength! Today we will talk about some best practices to follow regarding…
Read more at Better Programming | Find similar documentsIntegrate security testing into your development cycle with Foundry and Diligence Fuzzing
Security continues to be one of the most important aspects of web3. Continue reading on Level Up Coding
Read more at Level Up Coding | Find similar documentsHow to write secure PHP code
Writing secure PHP code is crucial for protecting your websites and applications from malicious attacks. Here are some essential practices… Continue reading on Level Up Coding
Read more at Level Up Coding | Find similar documents9 Secure Code Review Best Practices For Your Web Application
Due to rising customer demands and rapid, feature-driven development, security often takes the backseat and vulnerabilities are introduced and oftentimes go undetected. A secure code review helps…
Read more at Towards Data Science | Find similar documents- «
- ‹
- …