Part 1: Foundations of API Security

In this part, you will gain a foundational understanding of the key components of Application Programming Interface (API) security. You will understand the need for a holistic approach to API security as APIs become the main target for hackers. We then take a look at the core building blocks of APIs, including protocols, data formats, authentication, authorization, and their role in security. The OWASP API Security Top 10 takes you on a walk-through of the most common vulnerabilities, and finally, this part concludes with detailed post-mortems of some of the highest-profile breaches in recent times.

This part has the following chapters:

Get Defending APIs now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.