Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Practical Serverless and Microservices with C#

You're reading from   Practical Serverless and Microservices with C# Build resilient and secure microservices with the .NET stack and embrace serverless development in Azure

Arrow left icon
Product type Paperback
Published in Jul 2025
Publisher Packt
ISBN-13 9781836642015
Length 472 pages
Edition 1st Edition
Languages
Arrow right icon
Authors (2):
Arrow left icon
Gabriel Baptista Gabriel Baptista
Author Profile Icon Gabriel Baptista
Gabriel Baptista
Francesco Abbruzzese Francesco Abbruzzese
Author Profile Icon Francesco Abbruzzese
Francesco Abbruzzese
Arrow right icon
View More author details
Toc

Table of Contents (15) Chapters Close

Preface 1. Demystifying Serverless Applications 2. Demystifying Microservices Applications FREE CHAPTER 3. Setup and Theory: Docker and Onion Architecture 4. Azure Functions and Triggers Available 5. Background Functions in Practice 6. IoT Functions in Practice 7. Microservices in Practice 8. Practical Microservices Organization with Kubernetes 9. Simplifying Containers and Kubernetes: Azure Container Apps, and Othert Tools 10. Security and Observability for Serverless and Microservices Applications 11. The Car Sharing App 12. Simplifying Microservices with .NET Aspire 13. Other Books You May Enjoy
14. Index

Application Security Best Practices

A good approach to thinking about security in an application is to define it as an onion – with different layers of protection. The most important thing about any application is the data that is stored and processed by it. Considering this, the databases of an application must be designed to have the correct access and protection. However, securing the database is not enough to deliver a good solution, so you must also think about the security of the application itself, defining authentication and authorization for any user who will access it. Besides that, you need to understand that your application will probably use third-party components that must also be protected. Infrastructure also needs to be monitored and secure, and there are sophisticated ways to do so nowadays. Last, but not least, there are alternative solutions that can monitor our applications by intercepting the traffic that arrives at it, guaranteeing another layer of security...

lock icon The rest of the chapter is locked
Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Practical Serverless and Microservices with C#
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Modal Close icon
Modal Close icon