Understanding API Security


Gone are the days when it was acceptable for a piece of software to live in its own little silo, disconnected from the outside world. Today, services are expected to be available for programming, mixing, and building into new applications. The web-based Application Programming Interface, or API, is how services make themselves available in this dynamic world. By exposing an API, a service can find new life and utility far beyond what its core functionality was designed to be. But these APIs need to be secured and protected in order to be truly useful. An API that's simply left open to everyone, with no security controls, cannot be used to protect personalized or sensitive information, which severely limits its usefulness. The OAuth delegation and authorization protocol is one of the most popular standards for API security today. Understanding API Security is a selection of chapters from several Manning books that give you some context for how API security works in the real world by showing how APIs are put together and how the OAuth protocol can be used to protect them.
Download free tutorial in PDF (205 pages) created by .
Pages : 205
Size :
File type : PDF
Downloads: 123
Created: 2021-05-15
License: Free
Understanding API Security

Warning: Trying to access array offset on false in /home/tutovnfz/public_html/article.php on line 233

Others API Security Tutorials

Others related eBooks about Understanding API Security

Statistics with Julia

Download free course Statistics with Julia, pdf file on 413 pages by Hayden Klok, Yoni Nazarathy....

Pro Git, 2nd Edition

Pro Git (2nd Edition) is your fully-updated guide to Git and its usage in the modern world..., download free Git tutorial in PDF (456 pages) created by Scott Chacon ....

Notes on Diffy Qs: Differential Equations for Engineers

An introductory course on differential equations aimed at engineers. The book covers first order ODEs, higher order linear ODEs, systems of ODEs, Fourier series and PDEs, eigenvalue problems, the Laplace transform, and power series methods. The book originated as class notes for Math 286 at the Univ...

Semantic Systems. In the Era of Knowledge Graphs

Download free course Semantic Systems. In the Era of Knowledge Graphs, pdf file on 141 pages by Eva Blomqvist, Paul Groth, Victor de Boer, Tassilo Pellegrini, Mehwish Alam, Tobias Käfer, Peter Kieseberg, Sabrina Kirrane, Albert Meroño-Peñuela, Harshvardhan J. Pandit....

Intel Trusted Execution Technology for Server Platforms

Intel Trusted Execution Technology (Intel TXT) is a new security technology that started a..., download free Server Platforms tutorial in PDF (153 pages) created by William Futral ....

Defend Dissent

Download free course Defend Dissent, pdf file on 131 pages by Glencora Borradaile....

Case Studies in Infrastructure Change Management

Download free course Case Studies in Infrastructure Change Management, pdf file on 40 pages by by Wendy Look, Mark Dallman....

Crypto 101

Crypto 101 is an introductory course on cryptography, freely available for programmers of ..., download free Cryptography tutorial in PDF (254 pages) created by Laurens Van Houtven ....

Wireless Hacking tutorial

Download free PDF tutorial about Wireless Hacking and Technic of protection, training document under 70 pages intended to beginners by Edri Guy....

Assembly Programming

This courses provides a brief overview about Assembly programming ,a training file in PDF under 16 pages for download....