Summary

Here in Chapter 16, we discussed how to secure network connections using SSL and SSH, and explored some practical considerations for the PHP developer working on applications. This included a lengthy discussion of generating keys and certificates and using both SSL and SSH within a development environment.

In the next chapter, our last, we take a look at some very important but often overlooked topics in the realm of security.

Get Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.