Table of Contents:
  • Why is secure programming a concern?
  • Validating and sanitizing user input
  • Preventing SQL injection
  • Preventing cross-site scripting
  • Preventing remote execution
  • Enforcing security for temporary files
  • Preventing session hijacking
  • Securing REST services
  • Using CAPTCHAs
  • User authentication, authorization, and logging
  • Preventing data loss
  • Safe execution of system and remote procedure calls
  • Securing Unix
  • Securing your database
  • Using encryption
  • Securing network connections : SSL and SSH
  • Final recommendations