This content has moved to /doc/book/security/configuring-content-security-policy/