Securing the Application

  • Adam Shackelford


In the final chapter, we will be implementing a number of security measures in our application. There are, in fact, a number of disparate tasks we will carry out under the “security” blanket. First, we will provision an SSL certificate for our domain, then we can restrict sensitive interactions between the user and application to HTTPS. We can subsequently implement secure login for our application’s users and store passwords in encrypted fields in the database.


Load Balancer Certificate Authority Press Return Security Group Certificate Chain 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Adam Shackelford 2015

Authors and Affiliations

  • Adam Shackelford
    • 1
  1. 1.NYUnited States

Personalised recommendations