Chapter 4: The MEAN Stack Security