File tree Expand file tree Collapse file tree 6 files changed +74
-2
lines changed
Expand file tree Collapse file tree 6 files changed +74
-2
lines changed Original file line number Diff line number Diff line change @@ -117,3 +117,10 @@ Python applications.
117117 even chimed in to add his own fair assessment of the differences in the
118118 ORMs.
119119
120+ * [ peewee-async] ( https://peewee-async.readthedocs.io/en/latest/ )
121+ ([ source code] ( https://github.com/05bit/peewee-async ) ) is an alpha
122+ library for using Python 3's
123+ [ asyncio] ( https://docs.python.org/3/library/asyncio.html ) standard library
124+ with Peewee. This library is worth watching if you use an async
125+ [ web framework] ( /web-frameworks.html ) and want to have Peewee serve as your
126+ application's ORM.
Original file line number Diff line number Diff line change @@ -70,3 +70,11 @@ resulting tools as open source projects.
7070 due to partitions and consistency lag time that occur with just about every
7171 Cassandra setup.
7272
73+ * [ Getting the Most Out of Cassandra] ( https://www.youtube.com/watch?v=Q9EA8E-eLf0 )
74+ is a video for on data modeling and application development for developers
75+ new to Cassandra.
76+
77+ * [ How Discord Stores Billions of Messages] ( https://blog.discordapp.com/how-discord-stores-billions-of-messages-7fa6ec7ee4c7 )
78+ talks about the evolution of Discord's very large scale message store
79+ system from a [ MongoDB] ( /mongodb.html ) instance to Cassandra for storing
80+ messages in a distributed, replicated cluster.
Original file line number Diff line number Diff line change 1+ title: Cross-Site Request Forgery (CSRF)
2+ category: page
3+ slug: cross-site-request-forgery-csrf
4+ sortorder: 0458
5+ toc: False
6+ sidebartitle: CSRF
7+ meta: Cross-Site Request Forgery is a type of web app vulnerability that forces users to execute unwanted actions when authenticated to an application.
8+
9+
10+ # Cross-Site Request Forgery (CSRF)
11+
12+
13+ ### Cross-Site Request Forgery (CSRF) resources
14+ * [ Preventing cross-site attacks using same-site cookies] ( https://blogs.dropbox.com/tech/2017/03/preventing-cross-site-attacks-using-same-site-cookies/ )
15+ explains how Dropbox's engineering team rolled out their same-site
16+ cookie defense that augments other CSRF protections for users.
17+
18+ * [ Securing your site like it's 1999] ( https://24ways.org/2018/securing-your-site-like-its-1999/ )
19+ covers many common web application vulnerabilities including Cross-Site
20+ Request Forgery issues.
21+
Original file line number Diff line number Diff line change 1+ < h3 > What's next for deploying your web app?</ h3 >
2+ < div class ="row ">
3+ < div class ="c4 ">
4+ < div class ="well select-next ">
5+ {% include "choices/buttons/logging.html" %}
6+ </ div >
7+ </ div >
8+ < div class ="c4 ">
9+ < div class ="well select-next ">
10+ {% include "choices/buttons/configuration-management.html" %}
11+ </ div >
12+ </ div >
13+ < div class ="c4 ">
14+ < div class ="well select-next ">
15+ {% include "choices/buttons/web-analytics.html" %}
16+ </ div >
17+ </ div >
18+ </ div >
Original file line number Diff line number Diff line change 1+ < h3 > What Python subject do you want to learn next?</ h3 >
2+ < div class ="row ">
3+ < div class ="c4 ">
4+ < div class ="well select-next ">
5+ {% include "choices/buttons/no-sql-datastore.html" %}
6+ </ div >
7+ </ div >
8+ < div class ="c4 ">
9+ < div class ="well select-next ">
10+ {% include "choices/buttons/monitoring.html" %}
11+ </ div >
12+ </ div >
13+ < div class ="c4 ">
14+ < div class ="well select-next ">
15+ {% include "choices/buttons/web-application-security.html" %}
16+ </ div >
17+ </ div >
18+ </ div >
Original file line number Diff line number Diff line change @@ -137,7 +137,7 @@ <h4>4.12 <a href="/api-integration.html">API integration</a></h4>
137137< div class ="tc tds "> < a href ="/okta.html "> Okta</ a > </ div >
138138< h4 > 4.13 < a href ="/web-application-security.html "> Web application security</ a > </ h4 >
139139< div class ="tc tds "> < a href ="/sql-injection.html "> SQL injection</ a > </ div >
140- < div class ="tc tds sn " > Cross Site Request Forgery</ div >
140+ < div class ="tc tds " > < a href =" /cross-site-request-forgery-csrf.html " > Cross- Site Request Forgery</ a > </ div >
141141</ div >
142142
143143< div class ="c4 toc ">
@@ -150,7 +150,7 @@ <h3>5. <a href="/deployment.html">Web App Deployment</a></h3>
150150< h4 > 5.1 < span class ="sn "> Hosting</ span > </ h4 >
151151< div class ="tc "> < a href ="/servers.html "> Servers</ a > </ div >
152152< div class ="tc "> < a href ="/static-content.html "> Static content</ a > </ div >
153- < div class ="tc sn " > Content Delivery Networks</ div >
153+ < div class ="tc " > < a href =" /content-delivery-networks-cdns.html " > Content Delivery Networks (CDNs) </ a > </ div >
154154< h4 > 5.2 < a href ="/virtual-private-servers-vps.html "> Virtual Private Servers (VPSs)</ a > </ h4 >
155155< div class ="tc sn "> Linode</ div >
156156< div class ="tc sn "> Digital Ocean</ div >
You can’t perform that action at this time.
0 commit comments