mirror of
https://github.com/sbilly/awesome-security
synced 2024-11-22 11:23:15 +00:00
feat: update ebooks with new Node.js Secure Coding book
Adds the hands-on practical book [Node.js Secure Coding: Defending Against Command Injection Vulnerabilities](https://www.nodejs-security.com) Learn secure coding conventions in Node.js by executing command injection attacks on real-world npm packages and analyzing vulnerable code.
This commit is contained in:
parent
897b735188
commit
2df49de16a
1 changed files with 1 additions and 0 deletions
|
@ -452,6 +452,7 @@ Provided data: IPv4 hosts, sub/domains/whois, ports/banners/protocols, technolog
|
||||||
- [Edge Computing Technology and Applications](https://www.manning.com/books/edge-computing-technology-and-applications) - A book about the business and technical foundation you need to create your edge computing strategy.
|
- [Edge Computing Technology and Applications](https://www.manning.com/books/edge-computing-technology-and-applications) - A book about the business and technical foundation you need to create your edge computing strategy.
|
||||||
- [Spring Security in Action, Second Edition](https://www.manning.com/books/spring-security-in-action-second-edition) - A book about designing and developing Spring applications that are secure right from the start.
|
- [Spring Security in Action, Second Edition](https://www.manning.com/books/spring-security-in-action-second-edition) - A book about designing and developing Spring applications that are secure right from the start.
|
||||||
- [Azure Security](https://www.manning.com/books/azure-security-2) - A practical guide to the native security services of Microsoft Azure.
|
- [Azure Security](https://www.manning.com/books/azure-security-2) - A practical guide to the native security services of Microsoft Azure.
|
||||||
|
- [Node.js Secure Coding: Defending Against Command Injection Vulnerabilities](https://www.nodejs-security.com) - Learn secure coding conventions in Node.js by executing command injection attacks on real-world npm packages and analyzing vulnerable code.
|
||||||
|
|
||||||
## Other Awesome Lists
|
## Other Awesome Lists
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue