Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
Deep Dive Into OAuth2.0 and JWT (Part 2 OAuth2.0)
See why OAuth2.0 could be the security framework for you.
October 10, 2019
by
Satish Sharma
·
28,622 Views
·
18 Likes
What You Should Actually Know About Security in Ruby on Rails?
What no one tells you about Ruby on Rails security.
Updated October 10, 2019
by
Ronnie Arora
·
20,756 Views
·
5 Likes
Performance Capture I - Export HAR Using Selenium and BrowserMob-Proxy
Capture network data in a few, simple steps.
October 7, 2019
by
Gowthamraj Palani
·
25,653 Views
·
3 Likes
Cloud Performance Testing
With the great benefits of cloud performance testing come increased responsibility for planning and vigilance.
Updated October 4, 2019
by
RadhaKrishna Prasad
·
14,439 Views
·
2 Likes
Secure a Spring Boot App With Spring Security and PreAuthorize
Spring your authentication security forward with this comprehensive tutorial.
October 3, 2019
by
Andrew Hughes
·
122,166 Views
·
2 Likes
Differences between Keystore and Truststore
Finally master pesky Keystore and Truststore.
October 1, 2019
by
Crumb Peter
·
60,176 Views
·
6 Likes
Secure Spring REST API Using OAuth2 + MySQL
REST easy knowing your APIs are secure after this tutorial.
September 30, 2019
by
Mayur Shahapure
·
54,885 Views
·
6 Likes
Monitor Your App’s Health With Spring Boot Actuator
A tutorial for keeping your app healthy.
September 30, 2019
by
Jimena Garbarino
·
21,476 Views
·
6 Likes
Blockchain Document Signing Platform: Offering Security to Confidential Documents
Get the security your documents need.
September 27, 2019
by
Akash Takyar
·
12,091 Views
·
3 Likes
TCP: Out of Memory — Consider Tuning TCP_Mem
What happens when you're out of memory?
September 25, 2019
by
Ram Lakshmanan
CORE
·
24,701 Views
·
9 Likes
Microservices Using .Net Core 2.X With C# and Docker
A tutorial.
September 24, 2019
by
Satyen Mishra
·
46,873 Views
·
4 Likes
DataOps: Leveraging DevSecOps Principles for Secure Data Analytics
Better data security delivered faster.
September 23, 2019
by
Shahin Mohammadkhani
·
8,709 Views
·
4 Likes
How to Use Ionic 4 for JHipster 6 to Build a Mobile App
Learn more about how to use Ionic 4 with JHipster 6 and Spring Boot to build a secure mobile app.
September 20, 2019
by
Matt Raible
·
19,545 Views
·
3 Likes
Secure a REST API With MicroProfile and JWT Authentication
Don't sleep on REST API security.
September 19, 2019
by
Andrew Hughes
·
15,103 Views
·
7 Likes
Can I Have Too Many Dependency Injections?
Static analysis tools limit the parameters included with a method or class constructor. But are there cases where this needs to be adjusted?
September 19, 2019
by
John Vester
CORE
·
70,204 Views
·
1 Like
Using JUnit to Test Your Java Apps: An Advanced Guide
Unit testing helps ensure that your Java app is up to snuff.
September 11, 2019
by
Matt Raible
·
22,095 Views
·
5 Likes
Security Landscape for Containerized Apps
Keep it safe, keep everything contained.
September 4, 2019
by
Raghuveer Bhandarkar
·
6,170 Views
·
3 Likes
Spring Boot Tutorial: Build a Spring Boot App and Deploy Into Tomcat
Simplify deployment of your application in a few, simple steps.
Updated September 4, 2019
by
Lindsay Brunner
·
46,462 Views
·
8 Likes
Survey Reveals Rapid Growth in Kubernetes Usage, Security Still a Concern
What happens when you gather 400 DevOps, Security, and Product professionals in a room?
Updated August 30, 2019
by
Ali Golshan
·
22,762 Views
·
3 Likes
Node.js Security: The License and Security Risks of Using Node.js
Why open source software could make your application open for exploitation.
August 29, 2019
by
Rich Kosinski
·
10,993 Views
·
4 Likes
Previous
...
107
108
109
110
111
112
113
114
115
116
...
Next