Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
Secure a Spring Boot App With Spring Security and PreAuthorize
Spring your authentication security forward with this comprehensive tutorial.
October 3, 2019
by
Andrew Hughes
·
121,822 Views
·
2 Likes
Differences between Keystore and Truststore
Finally master pesky Keystore and Truststore.
October 1, 2019
by
Crumb Peter
·
60,040 Views
·
6 Likes
Secure Spring REST API Using OAuth2 + MySQL
REST easy knowing your APIs are secure after this tutorial.
September 30, 2019
by
Mayur Shahapure
·
54,766 Views
·
6 Likes
Monitor Your App’s Health With Spring Boot Actuator
A tutorial for keeping your app healthy.
September 30, 2019
by
Jimena Garbarino
·
21,401 Views
·
6 Likes
Blockchain Document Signing Platform: Offering Security to Confidential Documents
Get the security your documents need.
September 27, 2019
by
Akash Takyar
·
12,054 Views
·
3 Likes
TCP: Out of Memory — Consider Tuning TCP_Mem
What happens when you're out of memory?
September 25, 2019
by
Ram Lakshmanan
CORE
·
24,481 Views
·
9 Likes
Microservices Using .Net Core 2.X With C# and Docker
A tutorial.
September 24, 2019
by
Satyen Mishra
·
46,791 Views
·
4 Likes
DataOps: Leveraging DevSecOps Principles for Secure Data Analytics
Better data security delivered faster.
September 23, 2019
by
Shahin Mohammadkhani
·
8,654 Views
·
4 Likes
How to Use Ionic 4 for JHipster 6 to Build a Mobile App
Learn more about how to use Ionic 4 with JHipster 6 and Spring Boot to build a secure mobile app.
September 20, 2019
by
Matt Raible
·
19,491 Views
·
3 Likes
Secure a REST API With MicroProfile and JWT Authentication
Don't sleep on REST API security.
September 19, 2019
by
Andrew Hughes
·
15,022 Views
·
7 Likes
Can I Have Too Many Dependency Injections?
Static analysis tools limit the parameters included with a method or class constructor. But are there cases where this needs to be adjusted?
September 19, 2019
by
John Vester
CORE
·
70,159 Views
·
1 Like
Using JUnit to Test Your Java Apps: An Advanced Guide
Unit testing helps ensure that your Java app is up to snuff.
September 11, 2019
by
Matt Raible
·
22,038 Views
·
5 Likes
Security Landscape for Containerized Apps
Keep it safe, keep everything contained.
September 4, 2019
by
Raghuveer Bhandarkar
·
6,133 Views
·
3 Likes
Spring Boot Tutorial: Build a Spring Boot App and Deploy Into Tomcat
Simplify deployment of your application in a few, simple steps.
Updated September 4, 2019
by
Lindsay Brunner
·
46,337 Views
·
8 Likes
Survey Reveals Rapid Growth in Kubernetes Usage, Security Still a Concern
What happens when you gather 400 DevOps, Security, and Product professionals in a room?
Updated August 30, 2019
by
Ali Golshan
·
22,451 Views
·
3 Likes
Node.js Security: The License and Security Risks of Using Node.js
Why open source software could make your application open for exploitation.
August 29, 2019
by
Rich Kosinski
·
10,952 Views
·
4 Likes
Quick Guide to Microservices With Quarkus on Openshift
A quick tutorial to help you use Quarkus.
August 29, 2019
by
Piotr Mińkowski
·
15,253 Views
·
8 Likes
Proof of Work vs. Proof of Stake: An In-Depth Discussion
Get a handle on consensus mechanisms for cryptocurrencies.
August 27, 2019
by
Akash Takyar
·
12,809 Views
·
6 Likes
Ant-to-Maven Conversions: The Painless Method
You no longer need to sweat it over Ant-to-Maven conversions. We've got you covered.
August 23, 2019
by
Dinusha Nirmal
·
33,417 Views
·
2 Likes
Create Your JWTs From Scratch
Everything you need to create JWTs from scratch.
August 22, 2019
by
Lindsay Brunner
·
22,041 Views
·
4 Likes
Previous
...
105
106
107
108
109
110
111
112
113
114
...
Next