Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
Differences between Keystore and Truststore
Finally master pesky Keystore and Truststore.
October 1, 2019
by
Crumb Peter
·
60,384 Views
·
6 Likes
Secure Spring REST API Using OAuth2 + MySQL
REST easy knowing your APIs are secure after this tutorial.
September 30, 2019
by
Mayur Shahapure
·
55,052 Views
·
6 Likes
Monitor Your App’s Health With Spring Boot Actuator
A tutorial for keeping your app healthy.
September 30, 2019
by
Jimena Garbarino
·
21,646 Views
·
6 Likes
Blockchain Document Signing Platform: Offering Security to Confidential Documents
Get the security your documents need.
September 27, 2019
by
Akash Takyar
·
12,163 Views
·
3 Likes
TCP: Out of Memory — Consider Tuning TCP_Mem
What happens when you're out of memory?
September 25, 2019
by
Ram Lakshmanan
CORE
·
24,936 Views
·
9 Likes
Microservices Using .Net Core 2.X With C# and Docker
A tutorial.
September 24, 2019
by
Satyen Mishra
·
46,995 Views
·
4 Likes
DataOps: Leveraging DevSecOps Principles for Secure Data Analytics
Better data security delivered faster.
September 23, 2019
by
Shahin Mohammadkhani
·
8,789 Views
·
4 Likes
How to Use Ionic 4 for JHipster 6 to Build a Mobile App
Learn more about how to use Ionic 4 with JHipster 6 and Spring Boot to build a secure mobile app.
September 20, 2019
by
Matt Raible
·
19,642 Views
·
3 Likes
Secure a REST API With MicroProfile and JWT Authentication
Don't sleep on REST API security.
September 19, 2019
by
Andrew Hughes
·
15,203 Views
·
7 Likes
Can I Have Too Many Dependency Injections?
Static analysis tools limit the parameters included with a method or class constructor. But are there cases where this needs to be adjusted?
September 19, 2019
by
John Vester
CORE
·
70,318 Views
·
1 Like
Using JUnit to Test Your Java Apps: An Advanced Guide
Unit testing helps ensure that your Java app is up to snuff.
September 11, 2019
by
Matt Raible
·
22,188 Views
·
5 Likes
Security Landscape for Containerized Apps
Keep it safe, keep everything contained.
September 4, 2019
by
Raghuveer Bhandarkar
·
6,257 Views
·
3 Likes
Spring Boot Tutorial: Build a Spring Boot App and Deploy Into Tomcat
Simplify deployment of your application in a few, simple steps.
Updated September 4, 2019
by
Lindsay Brunner
·
46,622 Views
·
8 Likes
Survey Reveals Rapid Growth in Kubernetes Usage, Security Still a Concern
What happens when you gather 400 DevOps, Security, and Product professionals in a room?
Updated August 30, 2019
by
Ali Golshan
·
23,103 Views
·
3 Likes
Node.js Security: The License and Security Risks of Using Node.js
Why open source software could make your application open for exploitation.
August 29, 2019
by
Rich Kosinski
·
11,076 Views
·
4 Likes
Quick Guide to Microservices With Quarkus on Openshift
A quick tutorial to help you use Quarkus.
August 29, 2019
by
Piotr Mińkowski
·
15,408 Views
·
8 Likes
Proof of Work vs. Proof of Stake: An In-Depth Discussion
Get a handle on consensus mechanisms for cryptocurrencies.
August 27, 2019
by
Akash Takyar
·
13,308 Views
·
6 Likes
Ant-to-Maven Conversions: The Painless Method
You no longer need to sweat it over Ant-to-Maven conversions. We've got you covered.
August 23, 2019
by
Dinusha Nirmal
·
34,021 Views
·
2 Likes
Create Your JWTs From Scratch
Everything you need to create JWTs from scratch.
August 22, 2019
by
Lindsay Brunner
·
22,431 Views
·
4 Likes
How Secure Is the BLE Communication Standard?
Learn how to make BLE more secure.
Updated August 15, 2019
by
Daryna Kacherovska
·
36,620 Views
·
3 Likes
Previous
...
109
110
111
112
113
114
115
116
117
118
...
Next