P A R T  3

images

Practicing Secure Operations

In Part 2, we discussed creating scripts that are inherently as secure as they can be. Now in Part 3, we turn to the various components that contribute to making your applications secure. In this section, we'll discuss the following issues:

  • Making sure that your users are humans and not robots, in Chapter 9
  • Identifying those users as precisely as possible, specifying what those users can do in your application, and auditing what those users are doing in Chapter 10
  • Preventing data loss, in Chapter 11
  • Executing privileged scripts and handling remote procedure calls safely, in Chapter 12

Get Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.