Building a Secure API - Part 5
Building a Secure API - Part 5

Build out the secure login and request authorization flow in a few final steps

Read more


Api Security Series Part5 Rest Secureapi

 Building a Secure API - Part 4
Building a Secure API - Part 4

Building out the database and models to power the API

Read more


Api Security Series Part4 Rest Secureapi

 Building a Secure API - Part 3
Building a Secure API - Part 3

Improving the Slim structure to make it more extendable

Read more


Api Security Series Part3 Rest Secureapi

 Building a Secure API - Part 2
Building a Secure API - Part 2

Take the first steps into using Slim to create a secure API

Read more


Api Security Series Part2 Rest Secureapi

 Building a Secure API - Part 1
Building a Secure API - Part 1

API security doesn't have to be confusing if you build it in from the start.

Read more


Api Security Series Part1 Rest Secureapi

 Securing Legacy Applications - Part 2
Securing Legacy Applications - Part 2

Securing legacy code can be tricky, here's a few more hints

Read more


Secure Legacy Application Series Part2

 Securing Legacy Applications - Part 1
Securing Legacy Applications - Part 1

Securing legacy code can be tricky, here's a few "quick hits" to get you started

Read more


Secure Legacy Application Series Part1

Read more articles