@@ -2366,28 +2366,35 @@ <h2>JavaScript resources</h2>
23662366</ li >
23672367</ ul >
23682368< h2 > JavaScript learning checklist</ h2 >
2369- < p > < i class ="fa fa-check-square-o "> </ i >
2370- Create a simple HTML file with basic elements in it. Use the
2371- < code > python -m SimpleHTTPServer</ code > command to serve it up. Create a
2372- < code > <script type="text/javascript"></script></ code >
2373- element at the end of the < code > <body></ code > section in the HTML page. Start playing
2374- with JavaScript within that element to learn the basic syntax.</ p >
2375- < p > < i class ="fa fa-check-square-o "> </ i >
2376- Download < a href ="http://jquery.com/ "> JQuery</ a > and add it to the page above your
2377- JavaScript element. Start working with JQuery and learning how it makes basic
2378- JavaScript easier.</ p >
2379- < p > < i class ="fa fa-check-square-o "> </ i >
2380- Work with JavaScript on the page. Incorporate examples from open source
2381- projects listed below as well as JQuery plugins. Check out the Unheap link
2382- below to find a large collection of categorized JQuery plugins.</ p >
2383- < p > < i class ="fa fa-check-square-o "> </ i >
2384- Check out the JavaScript resources below to learn more about advanced concepts
2385- and open source libraries.</ p >
2386- < p > < i class ="fa fa-check-square-o "> </ i >
2387- Integrate JavaScript into your web application and check the
2388- < a href ="/static-content.html "> static content</ a > section for how to host the JavaScript
2389- files.</ p >
2390- < h3 > Do you need to style your app or deploy it next?</ h3 >
2369+ < ol >
2370+ < li >
2371+ < p > Create a simple HTML file with basic elements in it. Use the
2372+ < code > python -m SimpleHTTPServer</ code > command to serve it up. Create a
2373+ < code > <script type="text/javascript"></script></ code >
2374+ element at the end of the < code > <body></ code > section in the HTML page. Play
2375+ with JavaScript within that element to learn the basic syntax.</ p >
2376+ </ li >
2377+ < li >
2378+ < p > Download < a href ="http://jquery.com/ "> JQuery</ a > and add it to the page above your
2379+ JavaScript element. Start working with JQuery and learning how it makes
2380+ basic JavaScript easier.</ p >
2381+ </ li >
2382+ < li >
2383+ < p > Work with JavaScript on the page. Incorporate examples from open source
2384+ projects listed below as well as JQuery plugins. Check out
2385+ < a href ="http://www.unheap.com/ "> Unheap</ a > to find a large collection of categorized
2386+ JQuery plugins.</ p >
2387+ </ li >
2388+ < li >
2389+ < p > Check out the JavaScript resources below to learn more about advanced
2390+ concepts and open source libraries.</ p >
2391+ </ li >
2392+ < li >
2393+ < p > Integrate JavaScript into your web application and check the
2394+ < a href ="/static-content.html "> static content</ a > section for how to host the
2395+ JavaScript files.</ p >
2396+ </ li >
2397+ </ ol >
23912398 < h1 > WebSockets</ h1 >
23922399< p > A WebSocket is a < a href ="http://tools.ietf.org/html/rfc6455 "> standard protocol</ a > for
23932400two-way data transfer between a client and server. The WebSockets protocol
@@ -2601,7 +2608,6 @@ <h2>Python-specific WebSockets resources</h2>
26012608 I'm working to address.</ p >
26022609</ li >
26032610</ ul >
2604- < h3 > What's next for your web application after setting up WebSockets?</ h3 >
26052611 < h1 > Web Application Security</ h1 >
26062612< p > Website security must be thought about while building every level of the web
26072613stack. However, this section includes topics that deserve particular
@@ -2726,28 +2732,34 @@ <h2>General security resources</h2>
27262732</ li >
27272733</ ul >
27282734< h2 > Web security learning checklist</ h2 >
2729- < p > < i class ="fa fa-check-square-o "> </ i >
2730- Read and understand the major web application security flaws that are
2731- commonly exploited by malicious actors. These include cross-site request
2732- forgery (CSRF), cross-site scripting (XSS), SQL injection and session
2733- hijacking. The
2734- < a href ="https://www.owasp.org/index.php/Top_10_2013-Top_10 "> OWASP top 10 web application vulnerabilities list</ a >
2735- is a great place to get an overview of these topics.</ p >
2736- < p > < i class ="fa fa-check-square-o "> </ i >
2737- Determine how the framework you've chosen mitigates these vulnerabilities.</ p >
2738- < p > < i class ="fa fa-check-square-o "> </ i >
2739- Ensure your code implements the mitigation techniques for your framework. </ p >
2740- < p > < i class ="fa fa-check-square-o "> </ i >
2741- Think like an attacker and actively work to break into your own system. If
2742- you do not have enough experience to confidently break the security consider
2743- hiring a known white hat attacker. Have her break the application's security,
2744- report the easiest vulnerabilities to exploit in your app and help implement
2745- protections against those weaknesses.</ p >
2746- < p > < i class ="fa fa-check-square-o "> </ i >
2747- Recognize that no system is ever totally secure. However, the more popular
2748- an application becomes the more attractive a target it is to attackers.
2749- Reevaluate your web application security on a frequent basis.</ p >
2750- < h3 > What topic do you want to learn about next?</ h3 >
2735+ < ol >
2736+ < li >
2737+ < p > Read and understand the major web application security flaws that are
2738+ commonly exploited by malicious actors. These include cross-site request
2739+ forgery (CSRF), cross-site scripting (XSS), SQL injection and session
2740+ hijacking. The
2741+ < a href ="https://www.owasp.org/index.php/Top_10_2013-Top_10 "> OWASP top 10 web application vulnerabilities list</ a >
2742+ is a great place to get an overview of these topics.</ p >
2743+ </ li >
2744+ < li >
2745+ < p > Determine how the framework you've chosen mitigates these vulnerabilities.</ p >
2746+ </ li >
2747+ < li >
2748+ < p > Ensure your code implements the mitigation techniques for your framework. </ p >
2749+ </ li >
2750+ < li >
2751+ < p > Think like an attacker and actively work to break into your own system.
2752+ If you do not have enough experience to confidently break the security
2753+ consider hiring a known white hat attacker. Have her break the
2754+ application's security, report the easiest vulnerabilities to exploit in
2755+ your app and help implement protections against those weaknesses.</ p >
2756+ </ li >
2757+ < li >
2758+ < p > Recognize that no system is ever totally secure. However, the more popular
2759+ an application becomes the more attractive a target it is to attackers.
2760+ Reevaluate your web application security on a frequent basis.</ p >
2761+ </ li >
2762+ </ ol >
27512763 < h1 > Data</ h1 >
27522764< p > Data is an incredibly broad topic but it can be broken down into many
27532765subsections, including (in no particular order):</ p >
0 commit comments