Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
How to Secure APIs
Learn about authentication, rate-limiting, and more.
July 19, 2019
by
Tom Smith
CORE
·
36,282 Views
·
7 Likes
Most Important Security Elements (Part 1)
Visibility, mitigation, prioritization, and encryption — these are the most important elements to security right now.
Updated July 18, 2019
by
Tom Smith
CORE
·
29,323 Views
·
6 Likes
Most Effective Security Techniques (Part 1)
Creating a security culture supported by training, good hygiene, and processes are mentioned most frequently as effective security techniques.
Updated July 18, 2019
by
Tom Smith
CORE
·
13,503 Views
·
3 Likes
Keys to API Management
Security, ease of use, analytics, and lifecycle management.
July 17, 2019
by
Tom Smith
CORE
·
13,913 Views
·
3 Likes
Microservices Architecture With Spring Boot and Spring Cloud
Learn more about building a microservices architecture with Spring Boot and Spring Cloud.
July 16, 2019
by
Matt Raible
·
264,080 Views
·
22 Likes
Top 5 Free Courses to Learn Blockchain Programming
Want to learn more about blockchain — for free?
July 12, 2019
by
Javin Paul
·
41,819 Views
·
4 Likes
Dependency Management and Versioning With a Maven Multi-Module Project
Learn more about basic dependency management and versioning with Maven.
Updated July 11, 2019
by
Avraam Piperidis
·
115,444 Views
·
14 Likes
The Problem of String Concatenation and Format String Vulnerabilities
String concatenations can lead to major format string vulnerabilities in low-level programming languages.
July 10, 2019
by
Sven Morgenroth
·
24,158 Views
·
2 Likes
Security Application Use Cases
Use cases are prevalent in data protection and GDPR.
Updated July 10, 2019
by
Tom Smith
CORE
·
2,344 Views
Build a Spring Boot App With Secure Server-to-Server Communication Via OAuth 2.0
How to build a Spring Boot App for server-to-server communication via the OAuth 2.0 Client Credentials Grant type.
Updated July 8, 2019
by
Brian Demers
·
58,018 Views
·
17 Likes
Learn How to Use JUnit 5 to Test Your Spring Boot Apps
Testing your Spring Boot apps just got a lot easier with JUnit 5.
Updated July 2, 2019
by
Lindsay Brunner
·
87,117 Views
·
27 Likes
4 Spring Annotations Every Java Developer Should Know
Here are the most important Spring annotations that every Java developer should know.
July 1, 2019
by
Justin Albano
CORE
·
67,485 Views
·
67 Likes
DBMS_JOB — Watching for Failures
If you rely on jobs submitted via DBMS_JOB to fail, then read on.
June 28, 2019
by
Connor McDonald
·
11,844 Views
·
2 Likes
DevSecOps Keys to Success
The most important elements of a successful DevSecOps implementation are automation, shifting left, and collaboration.
Updated June 26, 2019
by
Tom Smith
CORE
·
18,577 Views
·
4 Likes
Mitigate Slow HTTP GET/POST Vulnerabilities in the Apache HTTP Server
Learn how you can mitigate slow HTTP GET/POST vulnerabilities in the Apache HTTP Server.
June 26, 2019
by
Ian Muscat
·
16,694 Views
·
1 Like
3 Books and Courses to Learn Spring Security 5 in Depth
Here are the top three resources for learning Spring Security.
Updated June 24, 2019
by
Javin Paul
·
20,199 Views
·
8 Likes
Learn How to Secure Service-to-Service Microservices
You've built a microservices architecture, but have you secured your service-to-service communication? If not, read on to learn how!
June 24, 2019
by
Matt Raible
·
56,210 Views
·
23 Likes
Using PowerMock to Mock Static Methods
What happens when you aren't able fo fall back on dependency injection? Take a look at this example of how PowerMock can help.
June 19, 2019
by
Roger Hughes
·
306,224 Views
·
13 Likes
Chaos Testing Your Microservices With Istio
In this post, we discuss the idea of chaos testing and how to perform fault injection with Istio to make sure your microservices are resilient.
June 17, 2019
by
Samir Behara
CORE
·
11,667 Views
·
6 Likes
Developing Peer-to-Peer Lending Platform on Blockchain
Get ready for the disruption in peer-to-peer lending process with the blockchain technology.
June 17, 2019
by
Akash Takyar
·
8,331 Views
·
4 Likes
Previous
...
107
108
109
110
111
112
113
114
115
116
...
Next