Real knowledge is to know the extent of oneâs ignorance.
Chapter 5Secure Your Database Interactions
In the last chapter we covered how to identify code injection attacks and ways to defend your server and processes. Weâll continue by learning about database security and especially about how most injection attacks target it.
The database is the heart of most modern web applicationsâwithout it the applications are just empty husks. Books with covers but no pages. Application data stored in the database, especially user information, is a prime target for attackers. They want the passwords and personal information to log into accounts on other sites. They desire financial and credit card information to empty user bank accounts. ...
Get Secure Your Node.js Web Application now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.