Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
7 Crucial Questions About Quantum Computing and Cybersecurity
In this article, we discuss the threat that Quantum Computing could have on cybersecurity and the viability of current hashing solutions.
January 6, 2020
by
Alan Grau
·
16,526 Views
·
3 Likes
What Is a Service Mesh, and Why Do You Need One?
The resolution of these challenges can be achieved by decoupling your application at layer five of the network stack, which is what service meshes do.
December 19, 2019
by
Daniel Berman
·
29,738 Views
·
9 Likes
Best Practices for Dependency Injection With Spring
Learn how to use Project Lombok when adopting dependency injection using the Spring Framework.
December 19, 2019
by
John Thompson
·
40,388 Views
·
17 Likes
Authenticate Your Angular App With JWTs
In this article, we discuss how to use JWTs and an Angular client to add user authentication to your Node and Express application.
Updated December 17, 2019
by
Holger Schmitz
·
25,908 Views
·
7 Likes
SOCKS5 Proxy and its Benefits
In this article, we discuss the benefits that SOCKS5 Proxy when compared to other proxy services currently available.
December 16, 2019
by
Jyo t
·
23,457 Views
·
4 Likes
Implement OAuth 2.0 Easily with Spring Boot and Spring Security
In this article, we discuss how to implement OAuth 2.0 with Spring Boot, Spring Security, and Okta for authentication.
December 16, 2019
by
Micah Silverman
·
116,585 Views
·
15 Likes
Tutorial: Secure Your Java App in 5 Minutes With OAuth 2.0
In this article, we discuss how to secure a Java application in five minutes with OAuth 2.0 and Maven.
December 13, 2019
by
Daniel Pereira
·
22,120 Views
·
9 Likes
Implement a Counter in Dataweave 2.x and Above
In this article, see how to implement a counter in DataWeave.
December 11, 2019
by
Rahul Kumar
·
21,283 Views
·
2 Likes
Building a Large-Scale Distributed Storage System Based on Raft
In this article, explore how one company built a large-scale distributed storage system based on Raft.
December 9, 2019
by
Ed Huang
·
18,148 Views
·
5 Likes
Build a Secure App Using Spring Boot and WebSockets
In this article, we discuss how to add user authentication to an application using Spring Boot, WebSockets, and Okta.
December 4, 2019
by
Jimena Garbarino
·
55,579 Views
·
6 Likes
Authenticate your JavaFX Desktop App
In this article, we discuss how to add a layer of authentication your JavaFX Desktop application with Microsoft's OAuth 2.0 User Agent library.
December 4, 2019
by
Andrew Hughes
·
13,053 Views
·
4 Likes
Types of Blockchain Ledgers
In this article, we discuss the two different kinds of blockchain ledgers (public and private) and which use cases or scenarios are optimal for each.
December 3, 2019
by
Sajan Agrawal
·
15,677 Views
·
3 Likes
Building Java Applications With Maven
Check out this stellar Java tutorial on building applications with Maven.
December 2, 2019
by
Justin Albano
CORE
·
55,785 Views
·
20 Likes
Microservices With Undertow: Dependency Injection
Learn all about what dependency injection is, what the different types of dependency injections are, and how to use Dagger.
Updated November 29, 2019
by
Sachin Walia
·
6,343 Views
·
2 Likes
Proxychains, Anonsurf, and MacChanger: Enhance Your Anonymity
In this article, we discuss how to use Proxychains, Anonsurf, and MacChanger in order to increase your level of anonymity while ethically hacking.
November 22, 2019
by
Aryya Paul
·
21,539 Views
·
4 Likes
Navigating the Microservice DeathStar With DeployHub
Destroy the DeathStar Red Leader! Learn more about microservices architecture with DeployHub.
November 22, 2019
by
Tracy Ragan
·
18,843 Views
·
2 Likes
Origin Authentication and RBAC in Istio with Custom Identity Provider
In this article, we discuss how to add origin authentication and RBAC in Itsio with Custom Identity provider in to increase your app's security.
Updated November 22, 2019
by
Rahul Rai
CORE
·
14,514 Views
·
8 Likes
Getting Started With Java and JSF
Learn more about using JavaServerFaces (JSF) in your Java apps.
November 21, 2019
by
Thiago Negri
·
16,503 Views
·
7 Likes
Mule OAuth 2.0 Provider in Mule 4
In this tutorial, learn how to apply the Mule OAuth 2.0 Provider in Mule 4.
November 20, 2019
by
Sadik Ali
CORE
·
27,265 Views
·
7 Likes
Open Policy Agent, Part II - Developing Policies
Go behind the scenes of Open Policy Agent.
Updated November 15, 2019
by
Ales Nosek
·
9,171 Views
·
5 Likes
Previous
...
103
104
105
106
107
108
109
110
111
112
...
Next