It’s possible, maybe even likely, that you will want to skip this chapter. After all, logging by itself doesn’t protect data, prevent intrusion, or anything else most developers think of when they think of “security.” But think of it another way – realistically, how many of you would even know if a hacker stole credentials via a SQL injection vulnerability in your login page, as described earlier in the book?
As proof of this, caches of passwords that are available to ethical security personnel (like the one at https://haveibeenpwned.com) have billions of passwords. And if you ...