BeginnerWeb SecurityDefensiveAppSec

Web Security for Developers

Real Threats, Practical Defense

4 / 5

Malcolm McDonald's developer-side primer on the OWASP-class issues, framed around real attacks and defended with code patterns rather than vendor products.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2020
Publisher
No Starch Press
Pages
216
Language
English

Read this if

Developers who want to understand security without security people in the loop. McDonald is the rare author who explains XSS, CSRF, SQLi, auth and sessions without offensive tooling distractions, in the language a working coder uses.

Skip this if

Practitioners who already know OWASP cold, or readers wanting depth on modern bug classes (SSRF chains, prototype pollution, race conditions). The book is foundational, not advanced.

Key takeaways

  • The framing "real threats, practical defense" is the book's design choice and its strongest pedagogical move; every chapter starts with the attack and ends with the defensive code pattern.
  • Web security is mostly the same dozen mistakes for two decades; once you know the taxonomy, modern variants are recognizable.
  • The chapter on session management and the chapter on third-party JS are the two highest-leverage pieces of the book for engineers who already know the basics.

Notes

Pair with The Tangled Web (Zalewski) for the conceptual depth on browser security model, and with Bug Bounty Bootcamp (Li) for the modern attacker view. Best book to assign to a backend engineer on their first week. The diagrams are unusually good for a No Starch security title; they reward re-reading.