Secure Your Node.js Web Application: Keep Attackers Out and Users Happy

Karl Duuna
3.88
24 ratings 2 reviews
Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement security best practices and effective countermeasures. Coding securely will make you a stronger web developer and analyst, and you'll protect your users. Bake security into your code from the start. See how to protect your Node.js applications at every point in the software development life cycle, from setting up the application environment to configuring the database and adding new functionality. You'll follow application security best practices and analyze common coding errors in applications as you work through the real-world scenarios in this book. Protect your database calls from database injection attacks and learn how to securely handle user authentication within your application. Configure your servers securely and build in proper access controls to protect both the web application and all the users using the service. Defend your application from denial of service attacks. Understand how malicious actors target coding flaws and lapses in programming logic to break in to web applications to steal information and disrupt operations. Work through examples illustrating security methods in Node.js. Learn defenses to protect user data flowing in and out of the application. By the end of the book, you'll understand the world of web application security, how to avoid building web applications that attackers consider an easy target, and how to increase your value as a programmer. What You In this book we will be using mainly Node.js. The book covers the basics of JavaScript and Node.js. Since most Web applications have some kind of a database backend, examples in this book work with some of the more popular databases, including MySQL, MongoDB, and Redis.
Genres: Hackers
232 Pages

Community Reviews:

5 star
5 (21%)
4 star
12 (50%)
3 star
6 (25%)
2 star
1 (4%)
1 star
0 (0%)

Readers also enjoyed

Other books by Karl Duuna

Lists with this book

The Tangled Web: A Guide to Securing Modern Web Applications
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Books For the Aspiring Hacker
66 books12 voters