Description
Product ID: | 9781617298820 |
Product Form: | Paperback / softback |
Country of Manufacture: | GB |
Title: | Practical Python Security |
Authors: | Author: Dennis Byrne |
Page Count: | 304 |
Subjects: | Computing and Information Technology, Computing & information technology, Internet searching, Software Engineering, Cloud computing, Network security, Internet searching, Software Engineering, Cloud computing, Network security |
Description: | Select Guide Rating No-nonsense techniques, libraries, and best practices you can use to keep your Python applications safe and secure. In F ull Stack Python Security: Cryptography, TLS, and attack resistance, you''ll learn how to:
Full Stack Python Security: Cryptography, TLS, and attack resistance teaches you everything you''ll need to build secure Python web applications. As you work through the insightful code snippets and engaging examples, you''ll put security standards, best practices, and more into action. Along the way, you''ll get exposure to important libraries and tools in the Python ecosystem. "An excellent reference for how to secure your Python systems." - Richard Vaughan No-nonsense techniques, libraries, and best practices you can use to keep your Python applications safe and secure. Full Stack Python Security: Cryptography, TLS, and attack resistance teaches you everything you''ll need to build secure Python web applications. As you work through the insightful code snippets and engaging examples, you''ll put security standards, best practices, and more into action. Along the way, you''ll get exposure to important libraries and tools in the Python ecosystem. In Full Stack Python Security: Cryptography, TLS, and attack resistance, you''ll learn how to: Use algorithms to encrypt, hash, and digitally sign data about the technology about the book This jargon-busting guide unravels common security acronyms, simplifies encryption and hashing, and unlocks other key security concepts. You''ll use Python and Django to build secure features including user registration, user authentication, and third party access to protected resources with OAuth 2. As you work through each project, you''ll master Python tools for implementing layers of defense for your applications. about the reader about the author |
Imprint Name: | Manning Publications |
Publisher Name: | Manning Publications |
Country of Publication: | GB |
Publishing Date: | 2021-12-27 |