July 2017
Intermediate to advanced
374 pages
8h
English
In order to secure our application from outside threats, there are a couple of alternative methods, which are described here. Usually, our application doesn't have any intelligence to identify suspicious activities. Hence, some of the important security measures are described as follows:
HTTP-based Auth
A simple username and password are hashed and sent to the web server by the client, like the one we have set up for our web application, as depicted in the following screenshot:

This preceding screenshot image is of the UI that we created in Chapter ...