Book Image

Hands-On Enterprise Application Development with Python

By : Saurabh Badhwar
Book Image

Hands-On Enterprise Application Development with Python

By: Saurabh Badhwar

Overview of this book

Dynamically typed languages like Python are continuously improving. With the addition of exciting new features and a wide selection of modern libraries and frameworks, Python has emerged as an ideal language for developing enterprise applications. Hands-On Enterprise Application Development with Python will show you how to build effective applications that are stable, secure, and easily scalable. The book is a detailed guide to building an end-to-end enterprise-grade application in Python. You will learn how to effectively implement Python features and design patterns that will positively impact your application lifecycle. The book also covers advanced concurrency techniques that will help you build a RESTful application with an optimized frontend. Given that security and stability are the foundation for an enterprise application, you’ll be trained on effective testing, performance analysis, and security practices, and understand how to embed them in your codebase during the initial phase. You’ll also be guided in how to move on from a monolithic architecture to one that is service oriented, leveraging microservices and serverless deployment techniques. By the end of the book, you will have become proficient at building efficient enterprise applications in Python.
Table of Contents (24 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
Index

Improving your application's security


Keeping your application secure can be achieved if we follow some basic rules of software security and implement them tightly in the application's development and production cycles:

  • Never trust your user input: As developers of the application, we should make sure that we don't trust any user input. Everything that may come from the user side should be filtered appropriately before it is processed by the application for storage or any other kind of operation that may cause the provided input to be executed.
  • Encrypt sensitive data: Any kind of sensitive data should have a strong encryption supporting its storage and retrieval. Having some amount of randomness in generating the encrypted version of the data can help a lot in making it difficult for attackers to get anything useful out of the data, even if they somehow got access to it.
  • Properly secure the infrastructure: The infrastructure that is being used to run the application should be secured properly...