Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
Package Signing in PIP
Do we need to automate package signing in PIP for PyPi?
July 24, 2019
by
Prahlad Yeri
·
8,981 Views
·
1 Like
Serverless Multi-Tier Architecture on AWS
AWS's serverless tools enable developers to create a connected multi-tier architecture for easily maintainable and scaleable applications.
July 24, 2019
by
Aarti Parikh
·
13,586 Views
·
7 Likes
Using Jakarta Security on Tomcat and the Payara Platform
Learn how to get started with Jakarta Security on Tomcat and Payara.
July 23, 2019
by
Arjan Tijms
·
5,831 Views
·
4 Likes
API Use Cases
What are some real-world problems APIs are solving?
Updated July 23, 2019
by
Tom Smith
CORE
·
17,221 Views
·
4 Likes
How to Secure APIs
Learn about authentication, rate-limiting, and more.
July 19, 2019
by
Tom Smith
CORE
·
36,343 Views
·
7 Likes
Most Important Security Elements (Part 1)
Visibility, mitigation, prioritization, and encryption — these are the most important elements to security right now.
Updated July 18, 2019
by
Tom Smith
CORE
·
29,359 Views
·
6 Likes
Most Effective Security Techniques (Part 1)
Creating a security culture supported by training, good hygiene, and processes are mentioned most frequently as effective security techniques.
Updated July 18, 2019
by
Tom Smith
CORE
·
13,552 Views
·
3 Likes
Keys to API Management
Security, ease of use, analytics, and lifecycle management.
July 17, 2019
by
Tom Smith
CORE
·
14,003 Views
·
3 Likes
Microservices Architecture With Spring Boot and Spring Cloud
Learn more about building a microservices architecture with Spring Boot and Spring Cloud.
July 16, 2019
by
Matt Raible
·
264,203 Views
·
22 Likes
Top 5 Free Courses to Learn Blockchain Programming
Want to learn more about blockchain — for free?
July 12, 2019
by
Javin Paul
·
41,926 Views
·
4 Likes
Dependency Management and Versioning With a Maven Multi-Module Project
Learn more about basic dependency management and versioning with Maven.
Updated July 11, 2019
by
Avraam Piperidis
·
115,765 Views
·
14 Likes
The Problem of String Concatenation and Format String Vulnerabilities
String concatenations can lead to major format string vulnerabilities in low-level programming languages.
July 10, 2019
by
Sven Morgenroth
·
24,219 Views
·
2 Likes
Security Application Use Cases
Use cases are prevalent in data protection and GDPR.
Updated July 10, 2019
by
Tom Smith
CORE
·
2,386 Views
Build a Spring Boot App With Secure Server-to-Server Communication Via OAuth 2.0
How to build a Spring Boot App for server-to-server communication via the OAuth 2.0 Client Credentials Grant type.
Updated July 8, 2019
by
Brian Demers
·
58,088 Views
·
17 Likes
Learn How to Use JUnit 5 to Test Your Spring Boot Apps
Guide on creating, securing, and testing a Spring Boot application with JUnit 5, covering REST API setup, OAuth 2.0 implementation, and unit/integration testing.
Updated July 2, 2019
by
Lindsay Brunner
·
87,262 Views
·
27 Likes
4 Spring Annotations Every Java Developer Should Know
Here are the most important Spring annotations that every Java developer should know.
July 1, 2019
by
Justin Albano
CORE
·
67,586 Views
·
67 Likes
DBMS_JOB — Watching for Failures
If you rely on jobs submitted via DBMS_JOB to fail, then read on.
June 28, 2019
by
Connor McDonald
·
11,880 Views
·
2 Likes
DevSecOps Keys to Success
The most important elements of a successful DevSecOps implementation are automation, shifting left, and collaboration.
Updated June 26, 2019
by
Tom Smith
CORE
·
18,694 Views
·
4 Likes
Mitigate Slow HTTP GET/POST Vulnerabilities in the Apache HTTP Server
Learn how you can mitigate slow HTTP GET/POST vulnerabilities in the Apache HTTP Server.
June 26, 2019
by
Ian Muscat
·
16,760 Views
·
1 Like
3 Books and Courses to Learn Spring Security 5 in Depth
Here are the top three resources for learning Spring Security.
Updated June 24, 2019
by
Javin Paul
·
20,258 Views
·
8 Likes
Previous
...
109
110
111
112
113
114
115
116
117
118
...
Next