Application - security threats in application logic
In this section, we look at the different methods that authenticate users, and make sure that our application is accessed by a genuine entity.
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.