13. Basic security

13.1 Preventing Cross-Site Scripting

13.2 Rejecting extra fields

13.3 Authenticating users

13.4 Exercise - Secure the back-office

13.5 Exercise solution - Secure the back-office