Book Image

Full-Stack Flask and React

By : Adedeji
3.5 (2)
Book Image

Full-Stack Flask and React

3.5 (2)
By: Adedeji

Overview of this book

Developing an interactive, efficient, and fast enterprise web application requires both the right approach and tooling. If you are a web developer looking for a way to tap the power of React’s reusable UI components and the simplicity of Flask for backend development to develop production-ready, scalable web apps in Python, then this book is for you. Starting with an introduction to React, a JavaScript library for building highly interactive and reusable user interfaces, you’ll progress to data modeling for the web using SQLAlchemy and PostgreSQL, and then get to grips with Restful API development. This book will aid you in identifying your app users and managing access to your web application. You’ll also explore modular architectural design for Flask-based web applications and master error-handling techniques. Before you deploy your web app on AWS, this book will show you how to integrate unit testing best practices to ensure code reliability and functionality, making your apps not only efficient and fast but also robust and dependable. By the end of this book, you’ll have acquired deep knowledge of the Flask and React technology stacks, which will help you undertake web application development with confidence.
Table of Contents (21 chapters)
1
Part 1 – Frontend Development with React
9
Part 2 – Backend Development with Flask

Understanding the fundamentals of information security

Information security is a critical aspect of web application development. In today’s digital age, personal and sensitive information is often stored and transmitted through web applications, making them vulnerable to various types of security threats. These threats can range from simple attacks such as SQL injection and cross-site scripting (XSS) to more complex attacks such as man-in-the-middle (MITM) and distributed denial of service (DDoS).

Let’s delve deeper into some of the various types of threats that can compromise your web application security:

  • SQL injection: This is a type of cyberattack in which an attacker injects malicious SQL code into an application’s input fields to trick the application into executing unintended database actions. This can lead to unauthorized access, data manipulation, or even data leakage.

    For instance, consider a web application login form where a user enters their...