Section 11.0. Introduction Recipe 11.1. Hardening Your Systems with Strong Passwords Recipe 11.2. Protecting Queries from SQL Injection Recipe 11.3. Guarding Against Cross-Site Scripting Attacks Recipe 11.4. Restricting Access to Public Methods or Actions Recipe 11.5. Securing Your Server by Closing Unnecessary Ports |