Explore our tutorial database

Category: Web application security

How to secure a web application from SQL injection attacks
Web application security sql-injection-attacks parameterized-queries web-application-security malicious-attacks identify-threats prevent-attacks web-application-protection secure-web-application
How to prevent cross-site scripting (XSS) attacks
Web application security cross-site-scripting xss-attacks cyber-attack security-measures xss-attacks-prevention website-security cyber-security cyber-attack-prevention
How to implement secure authentication and password management
Web application security secure-authentication password-management two-factor-authentication strong-passwords password-managers data-protection account-security implementation-strategies
How to protect against cross-site request forgery (CSRF) attacks
Web application security security csrf cross-site-request-forgery malicious-attack sensitive-information prevention threats vulnerabilities
How to secure web application servers and networks
Web application security best-practices secure web-application servers data-protection networks security-protocols malicious-attacks
How to perform a security assessment of a web application
Web application security web-application malicious-attacks security-measures security-assessment vulnerabilities risk-assessment safety protection
How to use encryption to protect sensitive data in transit and at rest
Web application security encryption data-security data-privacy data-protection data-transit data-rest data-encryption data-privacy-protection
How to implement secure session management
Web application security steps secure-session-management web-application-security implement-secure-session-management protect-user-data prevent-malicious-attacks overview ensure-secure-session-management
How to prevent unauthorized access to web application resources
Web application security secure web-application encryption data-protection unauthorized-access strong-passwords two-factor-authentication software-update
How to protect against denial of service (DoS) attacks
Web application security best-practices denial-of-service dos protect business identify prevent respond
How to use secure coding practices to prevent vulnerabilities
Web application security secure-coding prevent-vulnerabilities software-applications secure-coding-techniques identify-security-issues fix-security-issues overview-secure-coding protect-applications
How to deploy secure web application architectures
Web application security best-practices authentication secure web-application deploy architectures authorization encryption
How to use web application firewalls (WAFs) to protect against attacks
Web application security web-application-firewalls wafs protect-website data-security malicious-actors how-to-use-wafs configure-wafs maximum-protection
How to use two-factor authentication to enhance security
Web application security security basics set-up data-security two-factor-authentication online-accounts peace-of-mind accounts
How to use trusted SSL certificates to secure web applications
Web application security web-applications data-protection ssl-certificates secure-communication tips advice secure-web-applications trusted-ssl-certificates
How to protect against injection attacks using input validation and sanitization
Web application security website protect identify prevent injection-attacks input-validation sanitization malicious-code
How to secure data storage in a web application
Web application security authentication web-application web-application-security encryption data-security secure-data-storage security-measures data-safety
How to prevent sensitive data leakage through logging and error handling
Web application security best-practices logging error-handling secure-protocols encrypting-data secure-logging sensitive-data data-leakage
How to use access controls and permissions to secure web application resources
Web application security secure web-application types access-controls permissions unauthorized-access implement protect
How to secure web application communication with HTTPS and TLS
Web application security best-practices secure web-application setting-up malicious-attacks communication https tls
How to implement secure file uploads in a web application
Web application security guide web-application best-practices secure-file-uploads basics-of-file-uploads security-considerations file-uploads implement-secure
How to use strong passwords and password policies to prevent brute-force attacks
Web application security best-practices data-protection unauthorized-access strong-passwords password-security password-policies brute-force-attacks password-protection
How to secure web application authentication using single sign-on (SSO)
Web application security security setup authentication secure web-application user-experience single-sign-on sso
How to prevent cross-origin resource sharing (CORS) attacks
Web application security cross-origin-resource-sharing cors security-measures whitelist trusted-domains http-headers content-security-policy csp
How to secure web application data in the cloud
Web application security access-control data-protection unauthorized-access cloud-security web-application-security data-encryption data-monitoring data-safety
How to use secure cookie flags to prevent cookie hijacking
Web application security malicious-attacks website-security secure-cookie-flags cookie-hijacking setting-cookie-flags protect-website cookie-security website-protection
How to use rate limiting to prevent brute-force and DoS attacks
Web application security malicious-attacks protect-website rate-limiting brute-force dos-attacks basics-of-rate-limiting set-up-rate-limiting monitor-rate-limiting
How to use content security policies (CSPs) to prevent XSS attacks
Web application security basics content-security-policies csps xss-attacks website-security malicious-code user-safety implementation
How to use CAPTCHAs to prevent automated attacks
Web application security website types set-up protect captchas automated-attacks websites malicious-bots
How to secure web application servers using virtual private networks (VPNs)
Web application security secure set-up web-application-servers virtual-private-networks vpns configure-security-protocols protect-data best-tips
How to detect and prevent malware infections on web servers
Web application security guide monitoring best-practices prevent malware web-servers detect scanning
How to protect against clickjacking attacks using framebusting techniques
Web application security website protect prevent detect clickjacking framebusting malicious activities
How to use secure headers to improve web application security
Web application security configuration web-application-security xss-attacks clickjacking cross-site-scripting data-leakage secure-headers maximum-security
How to secure web application data using encryption at rest
Web application security security encryption web-application data-security encryption-algorithm best-practices data-at-rest implementation
How to prevent cross-domain attacks using the same-origin policy (SOP)
Web application security cross-domain-attacks same-origin-policy sop website-security malicious-attacks same-origin-policy-concept sop-implementation website-protection
How to secure web application communication using end-to-end encryption
Web application security guide basics web-application-security implementation end-to-end-encryption web-application-communication security-measure benefits
How to use vulnerability scanners to identify and fix web application vulnerabilities
Web application security security identify web-applications vulnerability-scanners web-application-vulnerabilities security-issues vulnerability-scanning fix
How to secure web application authentication using multi-factor authentication (MFA)
Web application security secure-web-application-authentication multi-factor-authentication mfa security-measure implement-mfa increased-security improved-user-experience reduced-risk-of-data-breaches
How to use secure file transfer protocols (SFTP, FTPS) to protect web application data
Web application security data-security secure-file-transfer-protocols sftp ftps web-application-data setting-up-sftp setting-up-ftps differences-between-sftp-and-ftps
How to prevent cookie poisoning attacks using secure cookie attributes
Web application security tools website-security cookie-poisoning-attacks secure-cookie-attributes malicious-actors monitoring-website knowledge website-safety
How to secure web application servers using firewalls and intrusion detection systems (IDS)
Web application security malicious-attacks data-security web-application-servers firewalls intrusion-detection-systems ids resources-protection tips-and-advice