Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Entity Framework Core 2.0

You're reading from   Mastering Entity Framework Core 2.0 Dive into entities, relationships, querying, performance optimization, and more, to learn efficient data-driven development

Arrow left icon
Product type Paperback
Published in Dec 2017
Publisher Packt
ISBN-13 9781788294133
Length 386 pages
Edition 1st Edition
Languages
Arrow right icon
Author (1):
Arrow left icon
Prabhakaran Anbazhagan Prabhakaran Anbazhagan
Author Profile Icon Prabhakaran Anbazhagan
Prabhakaran Anbazhagan
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. Kickstart - Introduction to Entity Framework Core 2. The Other Way Around – Database First Approach FREE CHAPTER 3. Relationships – Terminology and Conventions 4. Building Relationships – Understanding Mapping 5. Know the Validation – Explore Inbuilt Validations 6. Save Yourself – Hack Proof Your Entities 7. Going Raw – Leveraging SQL Queries in LINQ 8. Query Is All We Need – Query Object Pattern 9. Fail Safe Mechanism – Transactions 10. Make It Real – Handling Concurrencies 11. Performance – It's All About Execution Time 12. Isolation – Building a Multi-Tenant Database

Validating data without client-side scripting

We live in a world that recognizes the open source, performance-oriented, single page applications (reducing server round trips) as professional applications. Microsoft was too comfortable to move beyond server-side development. Later, they started experimenting client-side validations mainly, thanks to MVC2. Now, with MVC Core, they're back in the game!

This brings us to the million dollar question—is the client-side programming really safe? How long will it take for the hacker to break the client-side validation and get into the server? In today's world, even a dummy who has just started to learn how to hack could do that in minutes. To be blunt, we have no control on the client, and we cannot blindly trust the data we receive from the client (which could be hacked/injected by anybody using tools such as Fiddler...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime