Tag

security

HTTP Session Management

From Full Stack Python Security by Dennis Byrne

HTTP sessions are a necessity for all but the most trivial web applications. Web applications use HTTP sessions to isolate the traffic, context, and state of each user. This is the basis for every form of online transaction. If you’re buying something on Amazon, messaging someone on Facebook, or transferring money from your bank, the server must be able to identify you across multiple requests. This illustrates these concepts with Django.

Introduction to RSocket

From Spring Boot in Practice by Somnath Musib This article explores Rsocket and how it interacts with Spring Boot. Take 35% off Spring Boot in Practice by entering fccmusib into the discount code box at checkout at manning.com. In this… Continue Reading →

Using the Spring Web Scopes, Part 2

From Spring Start Here by Laurențiu Spilcă

This article covers

Using the Spring web scopes
Implementing a simple login functionality for a web app
Redirecting from one page to another in a web app

Using the Spring Web Scopes, Part 1

From Spring Start Here by Laurențiu Spilcă

This article covers

Using the Spring web scopes
Implementing a simple login functionality for a web app
Redirecting from one page to another in a web app

How does TLS work?

From Real-World Cryptography by David Wong This article describes how Transport Layer Security Works. Take 37% off Real-World Cryptography by entering fccwong into the discount code box at checkout at manning.com. Today, Transport Layer Security (TLS) is the de-facto standard… Continue Reading →

Microservices Security with gRPC and Kafka

In this video, we join Nuwan Dias in securing service-to-service interactions over gRPS and Kafka.

JSON Web Tokens & Alternatives

In this video, security expert Neil Madden explains self-contained tokens and JWTs in detail.

Securing Microservices with Istio Service Mesh

Security expert Prabath Siriwardena shows you how to secure Microservices with Istio Service Mesh.

Data Authentication with Keyed Hashing

By Dennis Byrne

This article explores securing data using keyed hashing in Python.

© 2022 Manning — Design Credits