12.7. Summary

This chapter focused on different issues related to security and logging. The points discussed here will help you prevent the misuse of your application in a way that could compromise data or even the system itself and minimize the effects if such a compromise were to happen. You have learned about XSS, path traversal, command injection, and weak authentication. You have also learned how to conveniently log various activities and prevent the accidental deletion of records by adding an IS_DELETED field.

This is the final chapter in the book and I sincerely hope you have enjoyed reading this book as much as I enjoyed writing it. But more importantly I hope that the ideas, reusable components, and basic applications awaken your creativity and serve you well in whatever projects you work on.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.248.159