Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Node Security

Buy
Node Security, 9781783281497 (1783281499), Packt Publishing, 2013

Take a deep dive into the world of securing your Node applications with Node Security

Overview

  • Examine security features and vulnerabilities within JavaScript
  • Explore the Node platform, including the event-loop and core modules
  • Solve common security problems with available npm modules

In Detail

Node.js is a fast-growing platform for building server applications using JavaScript. Now that it is being more widely used in production settings, Node applications will start to be specifically targeted for security vulnerabilities. Protecting your users will require an understanding of attack vectors unique to Node, as well as shared with other web applications.

To secure Node.js applications, we’ll start by helping you delve into the building blocks that make up typical Node applications. By understanding all the layers that you are building on top of, you can write code defensively and securely. In doing so, you will be able to protect your user's data and your infrastructure, while still using the rock-star technology behind Node.js.

Teaching you how to secure your Node applications by learning about each of the layers you will be building on top of; starting with JavaScript itself, then the Node platform, and finally the npm module ecosystem. By starting with JavaScript, you will learn what to avoid and what to embrace. Next, we will explain the Node platform, including its unique architecture and core modules, so you know how things work under the hood. Finally, we will introduce the rich ecosystem of npm modules, including modules to help you solve the common security problems you might face. Through our handy tutorials, you will be able to write secure Node.js applications, ones that will remain online under pressure and be able to weather the most common attacks that face web applications today.

What you will learn from this book

  • Master the origins of the Node.js and npm projects
  • Understand the architecture, including the event-loop and asynchronous I/O
  • Delve into the key aspects of avoiding some common pitfalls of JavaScript development
  • Incorporate ES5's security improvements, including strict-mode
  • Add static code analysis and the code-quality it promotes
  • Explore the basics of proper error-handling within Node applications
  • Understand the architecture of Express and Connect
  • Adapt common authentication and authorization schemes

Approach

A practical and fast-paced guide that will give you all the information you need to secure your Node applications.

Who this book is written for

If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

(HTML tags aren't allowed.)

Autobiographical Memory and the Self: Relationship and Implications for Cognitive-Behavioural Therapy
Autobiographical Memory and the Self: Relationship and Implications for Cognitive-Behavioural Therapy

Autobiographical memory shapes our understanding of ourselves, guides our behaviour, and helps us to develop and maintain relationships with others. The ways in which we interpret and narrate our memories have important implications for our psychological well-being, and can sometimes contribute to the onset and maintenance of a...

.NET Framework Standard Library Annotated Reference Volume 2
.NET Framework Standard Library Annotated Reference Volume 2

The .NET Framework Standard Library Annotated Reference, Volume 2, completes the definitive reference to the .NET Framework base class library. This book-and-CD set offers programmers unparalleled insight into the ECMA and ISO specifications for the classes...

SQL Success - Database Programming Proficiency
SQL Success - Database Programming Proficiency
SQL Success is about problem-solving in SQL. It bridges the gap between dry and dull database theory books, and developer books that focus on giving recipes without explaining sufficiently the reasons behind the recipes or discussing alternative solutions.
Many developers struggle with SQL due to the contrast between
...

Fuzzy Modeling Tools for Data Mining and Knowledge Discovery (The Morgan Kaufmann Series in Data Management Systems)
Fuzzy Modeling Tools for Data Mining and Knowledge Discovery (The Morgan Kaufmann Series in Data Management Systems)
Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration is a handbook for analysts, engineers, and managers involved in developing data mining models in business and government. As youll discover, fuzzy systems are extraordinarily valuable tools for representing and manipulating all kinds of data, and genetic...
Signals and Systems using MATLAB
Signals and Systems using MATLAB
Although it is hardly possible to keep up with advances in technology, it is reassuring to know that in science and engineering, development and innovation are possible through a solid understanding of basic principles. The theory of signals and systems is one of those fundamentals, and it will be the foundation of much research and...
Patent Law for Computer Scientists: Steps to Protect Computer-Implemented Inventions
Patent Law for Computer Scientists: Steps to Protect Computer-Implemented Inventions

Patent laws are different in many countries, and inventors are sometimes at a loss to understand which basic requirements should be satisfied if an invention is to be granted a patent. This is particularly true for inventions implemented on a computer. While roughly a third of all applications (and granted patents) relate, in one way or another,...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy