In the previous chapter, we looked at a few methods to improve the security of our application. We added anti-CSRF tokens to our forms, created an authentication middleware layer, and learned how to encrypt and decrypt values when needed.
Now we’re going to change gears and learn about front-end build tools. This topic is fraught with change and uncertainty. Unless you’re constantly in the front-end space, it’s difficult to know which tools to use and how to correctly configure them. Don’t worry—we’ll figure things out together.
We’ll start by setting up ...