Defending APIs

Defending APIs

Colin Domoney

63,10 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2024
Materia
Guías de Internet y servicios en línea
ISBN:
9781804617120
63,10 €
IVA incluido
Disponible
Añadir a favoritos

Get up to speed with API security using this comprehensive guide full of best practices for building safer and secure APIsKey FeaturesDevelop a profound understanding of the inner workings of APIs with a sharp focus on securityLearn the tools and techniques employed by API security testers and hackers, establishing your own hacking laboratoryMaster the art of building robust APIs with shift-left and shield-right approaches, spanning the API lifecyclePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionAlong with the exponential growth of API adoption comes a rise in security concerns about their implementation and inherent vulnerabilities. For those seeking comprehensive insights into building, deploying, and managing APIs as the first line of cyber defense, this book offers invaluable guidance. Written by a seasoned DevSecOps expert, Defending APIs addresses the imperative task of API security with innovative approaches and techniques designed to combat API-specific safety challenges.The initial chapters are dedicated to API building blocks, hacking APIs by exploiting vulnerabilities, and case studies of recent breaches, while the subsequent sections of the book focus on building the skills necessary for securing APIs in real-world scenarios.Guided by clear step-by-step instructions, you’ll explore offensive techniques for testing vulnerabilities, attacking, and exploiting APIs. Transitioning to defensive techniques, the book equips you with effective methods to guard against common attacks. There are plenty of case studies peppered throughout the book to help you apply the techniques you’re learning in practice, complemented by in-depth insights and a wealth of best practices for building better APIs from the ground up.By the end of this book, you’ll have the expertise to develop secure APIs and test them against various cyber threats targeting APIs.What you will learnExplore the core elements of APIs and their collaborative role in API developmentUnderstand the OWASP API Security Top 10, dissecting the root causes of API vulnerabilitiesObtain insights into high-profile API security breaches with practical examples and in-depth analysisUse API attacking techniques adversaries use to attack APIs to enhance your defensive strategiesEmploy shield-right security approaches such as API gateways and firewallsDefend against common API vulnerabilities across several frameworks and languages, such as .NET, Python, and JavaWho this book is forThis book is for application security engineers, blue teamers, and security professionals looking forward to building an application security program targeting API security. For red teamers and pentesters, it provides insights into exploiting API vulnerabilities. API developers will benefit understanding, anticipating, and defending against potential threats and attacks on their APIs. While basic knowledge of software and security is required to understand the attack vectors and defensive techniques explained in the book, a thorough understanding of API security is all you need to get started.Table of ContentsWhat Is API Security?API Access ControlUnderstanding Common API VulnerabilitiesCase Studies of Recent Breaches Foundations of Attacking APIsDiscovering APIs Attacking APIsShift-Left for API SecurityDefending against Common VulnerabilitiesSecuring Your Frameworks and LanguagesShield-Right for APIs with Runtime ProtectionSecuring MicroservicesImplementing an API Security Strategy

Artículos relacionados

  • Cloud Forensics Demystified
    Ganesh Ramakrishnan / Mansoor Haqanee
    Enhance your skills as a cloud investigator to adeptly respond to cloud incidents by combining traditional forensic techniques with innovative approachesKey FeaturesUncover the steps involved in cloud forensic investigations for M365 and Google WorkspaceExplore tools and logs available within AWS, Azure, and Google for cloud investigationsLearn how to investigate containerized ...
    Disponible

    63,10 €

  • BizTalk 2013 EDI for Supply Chain Management
    Mark Beckner
    Building a successful supply chain processing EDI implementation in BizTalk Server can be complex. Decisions must be made around how to extract and publish data, how to map to the various EDI standards, and how to appropriately batch and deliver data. If architected properly, your BizTalk solution can be highly efficient, simple, and something that can be managed and extended f...
    Disponible

    67,04 €

  • Interview Questions in Business Analytics
    Bhasker Gupta
    Discover relevant questions-and detailed answers-to help you prepare for job interviews and break into the field of analytics. This book contains more than 200 questions based on consultations with hiring managers and technical professionals already working in analytics. Interview Questions in Business Analytics: How to Ace Interviews and Get the Job You Want fills a gap in inf...
    Disponible

    48,65 €

  • Managing Your Outsourced IT Services Provider
    Venkatesh Upadrista
    Managing Your Outsourced IT Services Provider teaches executives and managers of organizations how to unleash the full potential of their outsourced IT services workforce and IT-enabled business processes safely and profitably. Drawing on two decades of experience managing client relationships for global IT services companies, Venkatesh Upadrista guides outsourcing organization...
    Disponible

    42,44 €

  • Mining Lurkers in Online Social Networks
    Andrea Tagarelli / Roberto Interdonato
    This SpringerBrief  brings order  to the wealth of research studies that contribute to shape our understanding of on-line social networks (OSNs)  lurking phenomena. This brief also drives the development of computational approaches that can be effectively applied to answer questions related to lurking behaviors, as well as to the engagement of lurkers in OSNs. All large-scale o...
    Disponible

    68,00 €

  • Semantic Systems. In the Era of Knowledge Graphs
    This open access book constitutes the refereed proceedings of the 16th International Conference on Semantic Systems, SEMANTiCS 2020, held in Amsterdam, The Netherlands, in September 2020. The conference was held virtually due to the COVID-19 pandemic. ...
    Disponible

    60,85 €