av Colin Domoney
636,-
Get up to speed with API security using this comprehensive guide full of best practices for building safer and secure APIsKey FeaturesDevelop a profound understanding of the inner workings of APIs with a sharp focus on securityLearn the tools and techniques employed by API security testers and hackers, establishing your own hacking laboratoryMaster the art of building robust APIs with shift-left and shield-right approaches, spanning the API lifecyclePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionAlong with the exponential growth of API adoption comes a rise in security concerns about their implementation and inherent vulnerabilities. For those seeking comprehensive insights into building, deploying, and managing APIs as the first line of cyber defense, this book offers invaluable guidance. Written by a seasoned DevSecOps expert, Defending APIs addresses the imperative task of API security with innovative approaches and techniques designed to combat API-specific safety challenges.The initial chapters are dedicated to API building blocks, hacking APIs by exploiting vulnerabilities, and case studies of recent breaches, while the subsequent sections of the book focus on building the skills necessary for securing APIs in real-world scenarios.Guided by clear step-by-step instructions, you'll explore offensive techniques for testing vulnerabilities, attacking, and exploiting APIs. Transitioning to defensive techniques, the book equips you with effective methods to guard against common attacks. There are plenty of case studies peppered throughout the book to help you apply the techniques you're learning in practice, complemented by in-depth insights and a wealth of best practices for building better APIs from the ground up.By the end of this book, you'll have the expertise to develop secure APIs and test them against various cyber threats targeting APIs.What you will learnExplore the core elements of APIs and their collaborative role in API developmentUnderstand the OWASP API Security Top 10, dissecting the root causes of API vulnerabilitiesObtain insights into high-profile API security breaches with practical examples and in-depth analysisUse API attacking techniques adversaries use to attack APIs to enhance your defensive strategiesEmploy shield-right security approaches such as API gateways and firewallsDefend against common API vulnerabilities across several frameworks and languages, such as .NET, Python, and JavaWho this book is forThis book is for application security engineers, blue teamers, and security professionals looking forward to building an application security program targeting API security. For red teamers and pentesters, it provides insights into exploiting API vulnerabilities. API developers will benefit understanding, anticipating, and defending against potential threats and attacks on their APIs. While basic knowledge of software and security is required to understand the attack vectors and defensive techniques explained in the book, a thorough understanding of API security is all you need to get started.Table of ContentsWhat Is API Security?API Access ControlUnderstanding Common API VulnerabilitiesCase Studies of Recent Breaches Foundations of Attacking APIsDiscovering APIs Attacking APIsShift-Left for API SecurityDefending against Common VulnerabilitiesSecuring Your Frameworks and LanguagesShield-Right for APIs with Runtime ProtectionSecuring MicroservicesImplementing an API Security Strategy