Front-End Tools

  • Christopher Pitt


In the previous chapter, we looked at a few methods to improve the security of our application. We added anti-CSRF tokens to our forms, created an authentication middleware layer, and learned how to encrypt and decrypt values when needed.

Copyright information

© Christopher Pitt 2018

Authors and Affiliations

  • Christopher Pitt
    • 1
  1. 1.Cape TownSouth Africa

Personalised recommendations