|
You are here |
www.redotheweb.com | ||
| | | | |
miparnisariblog.wordpress.com
|
|
| | | | | (The book and the answers to the questions at the end of each chapter.) Phew, this book took forever to finish. This is my attempt to summarise a 900+ page book :) Introduction Vulnerabilities in web apps arise because of one core problem: users can submit arbitrary input. Apps make themselves vulnerable by transmitting data... | |
| | | | |
www.trevorlasn.com
|
|
| | | | | Tips for Keeping All Frontend Applications Secure | |
| | | | |
marmelab.com
|
|
| | | | | The best practice regarding JWT storage is to use memory rather than local storage. But it comes with numerous challenges. Let's see how to tackle these in the case of a react-admin application. | |
| | | | |
nat.sakimura.org
|
|
| | | Background The personal data transmission of an individual from an attribute provider to another entity involves the "Consent". The typical consent is the one given by the data subject himself. However, there is another type of | ||