Tag

devices

Capability-Based Security and Macaroons

From API Security in Action by Neil Madden

In this article, you’ll implement capability-based access control techniques that enable secure sharing by taking the principle of least authority (POLA) to its logical conclusion and allowing fine-grained control over access to individual resources. Along the way, you’ll see how capabilities prevent a general category of attacks against APIs known as confused deputy attacks.

Building an App for the Farmer’s Market

From Flutter in Action by Eric Windmill

Learn a bit about using Flutter by learning about routing in a Farmer’s Market application.

© 2020 Manning — Design Credits