Torrent details for "Haro P. Secure APIs. Design, build, and implement 2025" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
None
Total Size:
36.4 MB
Info Hash:
354250F404DC72352FA8D38ED1B51B716DE0650F
Added By:
Added:
Oct. 22, 2025, 9:01 a.m.
Stats:
|
(Last updated: Oct. 22, 2025, 9:02 a.m.)
| File | Size |
|---|---|
| Haro P. Secure APIs. Design, build, and implement 2025.pdf | 36.4 MB |
Name
DL
Uploader
Size
S/L
Added
-
36.4 MB
[29
/
22]
2025-10-22
| Uploaded by andryold1 | Size 36.4 MB | Health [ 29 /22 ] | Added 2025-10-22 |
NOTE
SOURCE: Haro P. Secure APIs. Design, build, and implement 2025
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
Textbook in PDF format Practical, battle-tested techniques to recognize and prevent attacks on your APIs. Hackers know how important your APIs are, and they also know how to find the weak spots in your API security. As a result, APIs have become principal vectors of attack against apps and sites. Secure APIs: Design, build, and implement shows you reliable methods you can use to counter cracks, hacks, and attacks on your internal and external APIs. In this innovative new book, you’ll learn: Addressing the OWASP Top 10 API security vulnerabilities API security by design Zero-trust security Automated API testing strategies Observability and monitoring for threat detection Written for developers and architects, Secure APIs: Design, build, and implement shows you how to create and deploy APIs that are resistant to the most common security threats. Author José Peralta illustrates each vulnerability with extended code samples and shows you exactly how to mitigate them in your own APIs. You’ll find insights into emerging AI-powered security threats, along with tips and patterns for using LLMs in your own security testing. about the technology APIs are the primary way to share data and services privately inside applications and publicly with customers and partners. Unfortunately, they’re also a prime target for cyberattacks. Here’s the good news! There are proven strategies for finding vulnerabilities, locking out intruders, and building APIs that are secure by design. what's inside API security by design Zero-trust security Automated API testing strategies Observability and monitoring for threat detection about the reader For software developers and architects, cybersecurity professionals, and QA engineers. Examples are in Python
×


