Understanding API Security


Gone are the days when it was acceptable for a piece of software to live in its own little silo, disconnected from the outside world. Today, services are expected to be available for programming, mixing, and building into new applications. The web-based Application Programming Interface, or API, is how services make themselves available in this dynamic world. By exposing an API, a service can find new life and utility far beyond what its core functionality was designed to be. But these APIs need to be secured and protected in order to be truly useful. An API that's simply left open to everyone, with no security controls, cannot be used to protect personalized or sensitive information, which severely limits its usefulness. The OAuth delegation and authorization protocol is one of the most popular standards for API security today. Understanding API Security is a selection of chapters from several Manning books that give you some context for how API security works in the real world by showing how APIs are put together and how the OAuth protocol can be used to protect them.
Download free tutorial in PDF (205 pages) created by .
Pages : 205
Size :
File type : PDF
Downloads: 79
Created: 2021-05-15
License: Free
Understanding API Security

Others API Security Tutorials

Others related eBooks about Understanding API Security

Docker for Developers

Download free course Docker for Developers, pdf file on 153 pages by Rafael Gomes....

Engineering Reliable Mobile Applications

Download free course Engineering Reliable Mobile Applications, pdf file on 36 pages by Kristine Chen, Venkat Patnala, Devin Carraway, Pranjal Deo....

Ionic Succinctly

Download free course Ionic Succinctly, pdf file on 91 pages by Ed Freitas....

Intertwingled

Download free course Intertwingled, pdf file on 157 pages by Douglas Dechow, Daniele Struppa....

Implementing CIFS: The Common Internet File System

This book is an authoritative, cross-platform guide to CIFS capabilities and behavior. Implementing CIFS not only delivers the priceless knowledge of a Samba Team member dedicated to investigating the inner workings of CIFS, it also identifies and describes crucial specifications and supporting d...

A Graduate Course in Applied Cryptography

Download free course A Graduate Course in Applied Cryptography, pdf file on 900 pages by by Dan Boneh, Victor Shoup....

Tensorflow 2 Tutorial

Download free course Tensorflow 2 Tutorial, pdf file on 66 pages by Ren Zhang....

Version Control with Subversion

Download free course Version Control with Subversion, pdf file on 463 pages by C. Michael Pilato, Ben Collins-Sussman, Brian W. Fitzpatrick....

Introductory Statistics

This book follows the scope and sequence of a one-semester, introduction to statistics course and is geared toward students majoring in fields other than math or engineering. This text assumes students have been exposed to intermediate algebra, and it focuses on the applications of statistical know...

Microsoft DirectAccess Best Practices and Troubleshooting

DirectAccess is an amazing Microsoft technology that is truly the evolution of VPN; any Mi..., download free DirectAccess tutorial in PDF (116 pages) created by ....