Chapter 17. Securing Your Web Applications: Software and Hardware Security
In the previous chapter, we began our discussion of securing web applications by looking at the definition of security and identifying key threats we would face. We then developed a broad approach to dealing with security, first by looking at how to secure the code we write in PHP and SQL. We will continue the discussion by looking at how we secure our software and hardware.
In this chapter, we will