Part 2: Mitigating Risks in Implementation
The book’s second part looks at tools and strategies to reduce the security risks we identified in our earlier models.
This part has the following chapters:
- Chapter 7, Authentication and Authorization
- Chapter 8, Input Validation and Sanitization
- Chapter 9, Standard Web Application Vulnerabilities
- Chapter 10, Database Security