Wrapping Up

Fabulous—in this chapter you learned about various ways you can secure your networking layer and keep your service running despite errors (that others have somehow sneaked into your code). We covered how encryption protects messages so that others can’t listen in, how logging helps you understand and defend your application, and how to use error handling to prevent application crashes.

Let’s now move on to the most popular attack vector out there: code injection. In the next chapter, we’ll look at different code injection attacks and how to prevent them.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.149.237.26