Book Image

Polished Ruby Programming

By : Jeremy Evans
5 (1)
Book Image

Polished Ruby Programming

5 (1)
By: Jeremy Evans

Overview of this book

Anyone striving to become an expert Ruby programmer needs to be able to write maintainable applications. Polished Ruby Programming will help you get better at designing scalable and robust Ruby programs, so that no matter how big the codebase grows, maintaining it will be a breeze. This book takes you on a journey through implementation approaches for many common programming situations, the trade-offs inherent in each approach, and why you may choose to use different approaches in different situations. You'll start by refreshing Ruby fundamentals, such as correctly using core classes, class and method design, variable usage, error handling, and code formatting. Then you'll move on to higher-level programming principles, such as library design, use of metaprogramming and domain-specific languages, and refactoring. Finally, you'll learn principles specific to web application development, such as how to choose a database and web framework, and how to use advanced security features. By the end of this Ruby programming book, you’ll be a well rounded web developer with a deep understanding of Ruby. While most code examples and principles discussed in the book apply to all Ruby versions, some examples and principles are specific to Ruby 3.0, the latest release at the time of publication.
Table of Contents (23 chapters)
1
Section 1: Fundamental Ruby Programming Principles
8
Section 2: Ruby Library Programming Principles
17
Section 3: Ruby Web Programming Principles

Approaching high-security environments

In a high-security environment, you need to take all the precautions described previously in this chapter. What separates high-security environments from other environments is that you generally need to go further.

In a high-security environment, you should assume that no matter what steps you take, your application will be compromised at some point. Your job is to make this compromise as difficult as possible for the attacker, as well as to take whatever steps you can to mitigate the damage that an attacker can do if they can successfully compromise the application. In this section, you'll learn the basics of the following five techniques which can make compromise more difficult and which can mitigate the damage if compromise is successful:

  • Limiting database access
  • Internal firewalling
  • Randomizing memory layouts
  • Limiting filesystem access
  • Limiting system call access

Let's go through each of them in...