Haro P. Secure APIs. Design, build, and implement 2025
Download this torrent!
Haro P. Secure APIs. Design, build, and implement 2025
To start this P2P download, you have to install a BitTorrent client like qBittorrent
Category: Other
Total size: 36.35 MB
Added: 1 week ago (2025-10-22 06:55:01)
Share ratio: 71 seeders, 2 leechers
Info Hash: 354250F404DC72352FA8D38ED1B51B716DE0650F
Last updated: 13 hours ago (2025-10-28 23:37:48)
Description:
Textbook in PDF format
Practical, battle-tested techniques to recognize and prevent attacks on your APIs.
Hackers know how important your APIs are, and they also know how to find the weak spots in your API security. As a result, APIs have become principal vectors of attack against apps and sites. Secure APIs: Design, build, and implement shows you reliable methods you can use to counter cracks, hacks, and attacks on your internal and external APIs.
In this innovative new book, you’ll learn:
Addressing the OWASP Top 10 API security vulnerabilities
API security by design
Zero-trust security
Automated API testing strategies
Observability and monitoring for threat detection
Written for developers and architects, Secure APIs: Design, build, and implement shows you how to create and deploy APIs that are resistant to the most common security threats. Author José Peralta illustrates each vulnerability with extended code samples and shows you exactly how to mitigate them in your own APIs. You’ll find insights into emerging AI-powered security threats, along with tips and patterns for using LLMs in your own security testing.
about the technology
APIs are the primary way to share data and services privately inside applications and publicly with customers and partners. Unfortunately, they’re also a prime target for cyberattacks. Here’s the good news! There are proven strategies for finding vulnerabilities, locking out intruders, and building APIs that are secure by design.
what's inside
API security by design
Zero-trust security
Automated API testing strategies
Observability and monitoring for threat detection
about the reader
For software developers and architects, cybersecurity professionals, and QA engineers. Examples are in Python