Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Secure APIs (MEAP V09)

    Posted By: DexterDL
    Secure APIs (MEAP V09)

    Secure APIs (MEAP V09) by José Haro Peralta
    English | 2025 | ISBN: 9781633436633 | 405 pages | PDF,EPUB | 39.26 MB



    Practical, battle-tested techniques to recognize and prevent attacks on your APIs.

    Hackers know how important your APIs are, and they also know how to find the weak spots in your API security. As a result, APIs have become principal vectors of attack against apps and sites. Here’s the good news! There are effective, tested strategies for finding vulnerabilities, plugging security gaps, and building APIs that are secure by design, as well as a powerful new ally–generative AI.

    Secure APIs: Design, build, and implement shows you reliable methods you can use to counter cracks, hacks, and attacks on your internal and external APIs. In this innovative new book, you’ll learn:

    Addressing the OWASP Top 10 API security vulnerabilities
    API security by design
    Zero-trust security
    Automated API testing strategies
    Observability and monitoring for threat detection

    Written for developers and architects, Secure APIs: Design, build, and implement shows you how to create and deploy APIs that are resistant to the most common security threats. Author Jose Peralta illustrates each vulnerability with extended code samples and shows you exactly how to mitigate them in your own APIs. You’ll find insights into emerging AI-powered security threats, along with tips and patterns for using LLMs in your own security testing.
    about the book
    Secure APIs: Design, build, and implement shows you modern approaches to uncovering and stopping threats to your APIs, including the OWASP Top 10 API security vulnerabilities, architectural weaknesses, and common mistakes for authentication and authorization. Throughout the book, you’ll find techniques for testing system security, identifying data leak vectors, and discovering insufficient constraints.