Defending APIs : Uncover Advanced Defense Techniques to Craft Secure Application Programming Interfaces

Book Cover
Average Rating
Published
Packt Publishing, 2024.
Status
Available Online

Description

Loading Description...

More Details

Format
Language
English
ISBN
9781804613061, 1804613061

Notes

Description
Get up to speed with API security using this comprehensive guide full of best practices for building safer and secure APIs Key Features Develop a profound understanding of the inner workings of APIs with a sharp focus on security Learn the tools and techniques employed by API security testers and hackers, establishing your own hacking laboratory Master the art of building robust APIs with shift-left and shield-right approaches, spanning the API lifecycle Purchase of the print or Kindle book includes a free PDF eBook Book Description Along with the exponential growth of API adoption comes a rise in security concerns about their implementation and inherent vulnerabilities. For those seeking comprehensive insights into building, deploying, and managing APIs as the first line of cyber defense, this book offers invaluable guidance. Written by a seasoned DevSecOps expert, Defending APIs addresses the imperative task of API security with innovative approaches and techniques designed to combat API-specific safety challenges. The initial chapters are dedicated to API building blocks, hacking APIs by exploiting vulnerabilities, and case studies of recent breaches, while the subsequent sections of the book focus on building the skills necessary for securing APIs in real-world scenarios. Guided by clear step-by-step instructions, you'll explore offensive techniques for testing vulnerabilities, attacking, and exploiting APIs. Transitioning to defensive techniques, the book equips you with effective methods to guard against common attacks. There are plenty of case studies peppered throughout the book to help you apply the techniques you're learning in practice, complemented by in-depth insights and a wealth of best practices for building better APIs from the ground up. By the end of this book, you'll have the expertise to develop secure APIs and test them against various cyber threats targeting APIs. What you will learn Explore the core elements of APIs and their collaborative role in API development Understand the OWASP API Security Top 10, dissecting the root causes of API vulnerabilities Obtain insights into high-profile API security breaches with practical examples and in-depth analysis Use API attacking techniques adversaries use to attack APIs to enhance your defensive strategies Employ shield-right security approaches such as API gateways and firewalls Defend against common API vulnerabilities across several frameworks and languages, such as .NET, Python, and Java Who this book is for This book is for application security engineers, blue teamers, and security professionals looking forward to building an application security program targeting API security. For red teamers and pentesters, it provides insights into exploiting API vulnerabilities. API developers will benefit understanding, anticipating, and defending against potential threats and attacks on their APIs. While basic knowledge of software and security is required to understand the attack vectors and defensive techniques explained in the book, a thorough understanding of API security is all you need to get started.
Local note
O'Reilly O'Reilly Online Learning: Academic/Public Library Edition

Discover More

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Domoney, C. (2024). Defending APIs: Uncover Advanced Defense Techniques to Craft Secure Application Programming Interfaces . Packt Publishing.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Domoney, Colin. 2024. Defending APIs: Uncover Advanced Defense Techniques to Craft Secure Application Programming Interfaces. Packt Publishing.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Domoney, Colin. Defending APIs: Uncover Advanced Defense Techniques to Craft Secure Application Programming Interfaces Packt Publishing, 2024.

Harvard Citation (style guide)

Domoney, C. (2024). Defending apis: uncover advanced defense techniques to craft secure application programming interfaces. Packt Publishing.

MLA Citation, 9th Edition (style guide)

Domoney, Colin. Defending APIs: Uncover Advanced Defense Techniques to Craft Secure Application Programming Interfaces Packt Publishing, 2024.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
f42db7ca-fdd5-6ac1-d43c-c15522f89a23-eng
Go To Grouped Work View in Staff Client

Grouping Information

Grouped Work IDf42db7ca-fdd5-6ac1-d43c-c15522f89a23-eng
Full titledefending apis uncover advanced defense techniques to craft secure application programming interfaces
Authordomoney colin
Grouping Categorybook
Last Update2025-01-24 12:33:29PM
Last Indexed2025-05-03 03:40:00AM

Book Cover Information

Image Sourcegoogle_isbn
First LoadedMar 12, 2025
Last UsedMar 20, 2025

Marc Record

First DetectedDec 16, 2024 11:27:43 PM
Last File Modification TimeDec 17, 2024 08:29:00 AM
SuppressedRecord had no items

MARC Record

LEADER07702cam a22004697a 4500
001on1418731223
003OCoLC
00520241217082605.0
006m     o  d        
007cr |||||||||||
008240122s2024    xx      o     000 u eng d
019 |a 1418815918
020 |a 9781804613061
020 |a 1804613061
035 |a (OCoLC)1418731223|z (OCoLC)1418815918
037 |a 9781804617120|b O'Reilly Media
040 |a OCLKB|b eng|e pn|c OCLKB|d N$T|d YDX|d OCLCO|d ORMDA|d EBLCP|d OCLCQ|d DEGRU
049 |a MAIN
050 4|a QA76.76.A63
08204|a 005.3|2 23/eng/20240129
1001 |a Domoney, Colin
24510|a Defending APIs :|b Uncover Advanced Defense Techniques to Craft Secure Application Programming Interfaces
264 1|b Packt Publishing|c 2024
300 |a 1 online resource
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
5050 |a Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Foundations of API Security -- Chapter 1: What Is API Security? -- Why API security is important -- The growth of the API economy -- APIs are popular with developers -- APIs are increasingly popular with attackers -- Your existing tools do not work well for APIs -- Developers often lack an understanding of API security -- Exploring API building blocks -- Rate limiting -- Cryptography -- Hashes, HMACs, and signatures -- Transport security -- Encoding
5058 |a Examining API data formats -- Understanding the elements of API security -- DevOps -- SAST, DAST, SCA, and WAFs -- API management and gateways -- API security platforms -- Setting API security goals -- The three pillars of security -- Abuse and misuse cases -- Data governance -- A positive security model -- Risk-based methodology -- Summary -- Further reading -- Chapter 2: Understanding APIs -- Understanding HTTP fundamentals -- Uniform Resource Locator -- Requests -- Responses -- Methods -- Status codes -- Sessions -- Exploring the types of APIs -- REST -- GraphQL -- RPC -- SOAP -- WebSockets
5058 |a Access control -- No authentication -- HTTP authentication -- AWS keyed-HMAC authentication -- Session cookies -- API keys -- OAuth 2.0 -- Access control best practices and methods -- Using JWTs for claims and identity -- Summary -- Further reading -- Chapter 3: Understanding Common API Vulnerabilities -- The importance of vulnerability classification -- Exploring the Open Worldwide Application Security Project API Security Top 10 -- Object-level vulnerabilities -- Authentication vulnerabilities -- Function-level vulnerabilities -- Data vulnerabilities -- Configuration vulnerabilities
5058 |a Implementation vulnerabilities -- Vulnerabilities versus abuse cases -- Exploring abuse cases -- Business logic vulnerabilities -- Preview of the Open Worldwide Application Security Project API Security Top 10 2023 -- Summary -- Further reading -- Chapter 4: Investigating Recent Breaches -- The importance of learning from mistakes -- Examining 10 high-profile API breaches from 2022 -- 1-Global shipping company -- 2-Campus access control -- 3-Microbrewery application -- 4-Cryptocurrency portal -- 5-Dating application -- 6-The All in One SEO WordPress plugin -- 7-X account information leakage
5058 |a 8-Home router -- 9-Remote access to two popular vehicles -- 10-Smart Scale -- Key takeaways and learning -- Summary -- Further reading -- Part 2: Attacking APIs -- Chapter 5: Foundations of Attacking APIs -- Technical requirements -- Understanding API attackers and their methods -- Interacting with APIs -- Finding API keys -- Enumeration and discovery of APIs -- Fuzzing API endpoints -- Attacking JWTs -- Mastering the tools of the trade -- CLI clients (HTTPie/cURL) -- Postman -- Browser tools -- Burp Suite -- Reverse proxies -- Learning the key skills of API attacking -- Building a laboratory
520 |a Get up to speed with API security using this comprehensive guide full of best practices for building safer and secure APIs Key Features Develop a profound understanding of the inner workings of APIs with a sharp focus on security Learn the tools and techniques employed by API security testers and hackers, establishing your own hacking laboratory Master the art of building robust APIs with shift-left and shield-right approaches, spanning the API lifecycle Purchase of the print or Kindle book includes a free PDF eBook Book Description Along with the exponential growth of API adoption comes a rise in security concerns about their implementation and inherent vulnerabilities. For those seeking comprehensive insights into building, deploying, and managing APIs as the first line of cyber defense, this book offers invaluable guidance. Written by a seasoned DevSecOps expert, Defending APIs addresses the imperative task of API security with innovative approaches and techniques designed to combat API-specific safety challenges. The initial chapters are dedicated to API building blocks, hacking APIs by exploiting vulnerabilities, and case studies of recent breaches, while the subsequent sections of the book focus on building the skills necessary for securing APIs in real-world scenarios. Guided by clear step-by-step instructions, you'll explore offensive techniques for testing vulnerabilities, attacking, and exploiting APIs. Transitioning to defensive techniques, the book equips you with effective methods to guard against common attacks. There are plenty of case studies peppered throughout the book to help you apply the techniques you're learning in practice, complemented by in-depth insights and a wealth of best practices for building better APIs from the ground up. By the end of this book, you'll have the expertise to develop secure APIs and test them against various cyber threats targeting APIs. What you will learn Explore the core elements of APIs and their collaborative role in API development Understand the OWASP API Security Top 10, dissecting the root causes of API vulnerabilities Obtain insights into high-profile API security breaches with practical examples and in-depth analysis Use API attacking techniques adversaries use to attack APIs to enhance your defensive strategies Employ shield-right security approaches such as API gateways and firewalls Defend against common API vulnerabilities across several frameworks and languages, such as .NET, Python, and Java Who this book is for This book is for application security engineers, blue teamers, and security professionals looking forward to building an application security program targeting API security. For red teamers and pentesters, it provides insights into exploiting API vulnerabilities. API developers will benefit understanding, anticipating, and defending against potential threats and attacks on their APIs. While basic knowledge of software and security is required to understand the attack vectors and defensive techniques explained in the book, a thorough understanding of API security is all you need to get started.
590 |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition
650 0|a Application program interfaces (Computer software)|9 72854
77608|i Print version:|z 1804617121|z 9781804617120|w (OCoLC)1346944681
85640|u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781804617120/?ar|x O'Reilly|z eBook
938 |b OCKB|z netlibrary.ebooks,96327760-7499-4728-9c35-26c1044b8326-emi
938 |a YBP Library Services|b YANK|n 305946764
938 |a EBSCOhost|b EBSC|n 3776838
994 |a 92|b VIA
999 |c 360481|d 360481