Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
Implementing OAuth2 Social Login With Facebook (Part 1)
Implement authentication with OAuth2 in minutes.
November 13, 2019
by
Nilesh Sanyal
CORE
·
24,552 Views
·
7 Likes
Build a Java REST API With Quarkus
Learn more about building a REST API service with Quarkus.
November 13, 2019
by
Andrew Hughes
·
61,446 Views
·
14 Likes
The Relationship Between Modularity and Polymorphism
Clean code for all.
November 12, 2019
by
pooya Shahbazian
·
8,679 Views
·
4 Likes
Security Token Basics: Part 1 How to Launch an STO
Get started on the road to launching STOs.
November 11, 2019
by
Akash Takyar
·
13,219 Views
·
3 Likes
Running Your Jupyter Notebooks on The Cloud
Take a look at how to run Jupyer notebooks on virtual machines and on-premises using Docker.
Updated November 8, 2019
by
Mani Sarkar
·
2,315 Views
Building a Java App With Gradle
Here's everything you ever wanted to know about building a Java application with Gradle.
November 6, 2019
by
Andrew Hughes
·
23,765 Views
·
5 Likes
How to Migrate a Project From ASP.NET MVC to ASP.NET Core
Get going with ASP.NET Core.
Updated November 6, 2019
by
Dmitriy Kulagin
CORE
·
18,649 Views
·
2 Likes
Demystifying Security on AWS Cloud
As the largest commercial cloud provider, AWS Cloud has a number of measures in place to ensure security according to the Shared Responsibility model.
Updated November 4, 2019
by
Avinash Goyal
CORE
·
11,018 Views
·
8 Likes
Use Configuration-Based Dependency Injection on TFLearn to Improve Iterative Deep Learning Development Process
Do it!
Updated November 1, 2019
by
Colin Lu
·
6,270 Views
·
5 Likes
How to Enable Sign-in With iOS Biometric Authentication
Up your security game with biometric authentication.
October 29, 2019
by
ID Guard Offline
·
14,627 Views
·
3 Likes
5 More Reasons to Choose Apache Pulsar Over Kafka
Move on: go with Pulsar if you want to live.
Updated October 29, 2019
by
Chris Bartholomew
·
12,883 Views
·
5 Likes
DevOps Trends 2019 — What You Need to Know
See what research is saying about the path of DevOps in 2019 and beyond.
Updated October 29, 2019
by
Pavan Belagatti
CORE
·
48,432 Views
·
30 Likes
Five Reasons Why a Seedbox Is a Practical Alternative to VPN
Why a Seedbox could be a viable alternative to VPNs
October 25, 2019
by
Sophia jons
·
13,031 Views
·
2 Likes
Secure and Deploy Your Spring Boot App With AWS Elastic Beanstalk
Easily secure and deploy your Spring Boot application.
Updated October 21, 2019
by
Daniel Pereira
·
16,318 Views
·
3 Likes
Use OAuth 2.0 to Secure Your ASP.NET Core App
Secure your ASP.NET application with OAuth.
October 16, 2019
by
Lindsay Brunner
·
35,394 Views
·
2 Likes
Integrate SSO With Spring Boot and OAuth 2.0
See how to integrate SSO with Spring Boot and OAuth 2.0.
October 16, 2019
by
Micah Silverman
·
60,443 Views
·
17 Likes
Getting Started With HTTP/2
See why HTTP/2 might be for you!
October 15, 2019
by
Randhir Singh
·
23,951 Views
·
10 Likes
Open Policy Agent, Part I - The Introduction
Get started with Open Policy Agent.
October 14, 2019
by
Ales Nosek
·
26,974 Views
·
10 Likes
Learn How to Secure your ASP.NET MVC App with SSO
Secure your ASP.NET MVC application with SSO.
October 11, 2019
by
Lindsay Brunner
·
28,216 Views
·
1 Like
A Simple MicroProfile JWT Token Provider With Payara Realms and JAX-RS
Create a MicroProfile JWT token provider.
October 11, 2019
by
Víctor Orozco
·
8,855 Views
·
3 Likes
Previous
...
106
107
108
109
110
111
112
113
114
115
...
Next