Book Image

Hands-On RESTful Web Services with TypeScript 3

By : Biharck Muniz Araújo
5 (1)
Book Image

Hands-On RESTful Web Services with TypeScript 3

5 (1)
By: Biharck Muniz Araújo

Overview of this book

In the world of web development, leveraging data is the key to developing comprehensive applications, and RESTful APIs help you to achieve this systematically. This book will guide you in designing and developing web services with the power of TypeScript 3 and Node.js. You'll design REST APIs using best practices for request handling, validation, authentication, and authorization. You'll also understand how to enhance the capabilities of your APIs with ODMs, databases, models and views, as well as asynchronous callbacks. This book will guide you in securing your environment by testing your services and initiating test automation with different testing approaches. Furthermore, you'll get to grips with developing secure, testable, and more efficient code, and be able to scale and deploy TypeScript 3 and Node.js-powered RESTful APIs on cloud platforms such as the Google Cloud Platform. Finally, the book will help you explore microservices and give you an overview of what GraphQL can allow you to do. By the end of this book, you will be able to use RESTful web services to create your APIs for mobile and web apps and other platforms.
Table of Contents (20 chapters)
Free Chapter
1
Section 1: Unraveling API Design
5
Section 2: Developing RESTful Web Services
10
Section 3: Enhancing RESTful Web Services
15
Section 4: Extending the Capabilities of RESTful Web Services

Summary

Even though this is just a small part of the huge world of security, you have gained an understanding of some of the best practices when it comes to developing APIs, such as authentication, authorization, HTTPS, and so on.

In this chapter, we covered a simple way to encrypt sensitive information that is persisted outside the application and perhaps over the internet.

As part of the authentication process, you were able to use Passport for JWT and validate whether the user has a valid token or not.

In the next chapter, will show you how to improve logging and error handling.