Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
Monitoring Microsoft Azure With Logz.io
Take a look at how you can monitor your Azure instance and create dashboards with other integrations.
February 19, 2019
by
Daniel Berman
·
8,906 Views
·
1 Like
The Mystery Behind Testing ''The Integration of Payment Gateways''
Ever wondered how to test payment gateway integrations effectively?
February 15, 2019
by
Sadhvi Singh
·
20,455 Views
·
4 Likes
Getting Started With Serenity BDD and Cucumber 4
Whether your preferred design pattern is Page Objects, Lean Page Objects, or another one, here's how to write automated tests with Serenity BDD.
February 15, 2019
by
John Ferguson Smart
·
44,183 Views
·
5 Likes
Dependency Injection in .NET Core Console Applications
We take a look at how to implement dependency injection in smaller .NET Core apps, while also addressing the challenges of doing this in larger, real-world applications.
February 15, 2019
by
Gunnar Peipman
·
81,455 Views
·
5 Likes
Spring Boot and OAuth2: Getting the Authorization Code
Need help implementing Spring Boot and OAuth2?
February 14, 2019
by
Vijay Maniyar
·
111,937 Views
·
24 Likes
A Simple Checklist for Apache Ignite Beginners
If you're just starting with this great open source framework, don't worry, we're here to help. Check out this great resource to help get you going.
February 13, 2019
by
Shamim Bhuiyan
·
23,904 Views
·
5 Likes
Vulnerability Threat Control Paradigm and CIA Triads – Computer Security
Learn more about the Vulnerability Threat Control Paradigm.
February 13, 2019
by
Arslan ud Din Shafiq
·
13,238 Views
·
2 Likes
IoT-Enabled Embedded Web Server Reference Example
Embedded HTTP and WebSocket servers have been designed specifically for tiny microcontrollers with limited resources.
Updated February 12, 2019
by
Wilfred Nilsen
·
30,862 Views
·
5 Likes
Using TLS With Rust: Authentication
Learn how to implement the authentication portion of your network protocol in Rust.
February 12, 2019
by
Oren Eini
·
7,628 Views
·
3 Likes
Using TLS in Rust: Getting Async I/O With tokio (Part 2)
Check out this second installment on using Async I/O and tokio!
February 8, 2019
by
Oren Eini
·
9,300 Views
·
2 Likes
Password Encoder Migration With Spring Security 5
Learn more about implementing the password encoder migration with Spring Security 5.
February 7, 2019
by
Marcos Barbero
CORE
·
36,007 Views
·
11 Likes
Trust Models for Secure Network Connections
Explore the concept of trust in cryptography.
February 4, 2019
by
Andrii Fedotov
·
14,091 Views
·
1 Like
Applying Hexagonal Architecture to a Symfony Project
We look at how the hexagonal architecture promotes maintainable, clean, and testable code before showing how to use it in a PHP-based project.
February 1, 2019
by
Javier Gomez
·
20,035 Views
·
2 Likes
The Importance of Security in the Current Cryptocurrency Space
In the cryptocurrency space, the need to have improved safeguards is critical.
January 31, 2019
by
Amit Dua
·
7,121 Views
·
1 Like
What Is Asymmetric Encryption?
Learn what asymmetric encryption is, how it works, and what it does.
January 31, 2019
by
Jake Adley
·
19,302 Views
·
1 Like
Server Name Indication (SNI) and Ingress TLS in Kubernetes with Ambassador
SNI is a great security feature to have to help enable the serving of multiple certificates on from a single IP.
January 30, 2019
by
Daniel Bryant
·
8,810 Views
·
1 Like
API Authentication With GCP Identity-Aware Proxy
Learn more about how you can securely expose APIs in GCP.
January 28, 2019
by
Tyler Treat
·
12,576 Views
·
1 Like
Guide to Behavior-Driven Development in Java
Get your behavior in check with this look at behavior-driven development in Java.
January 25, 2019
by
Mahmoud Anouti
·
55,002 Views
·
19 Likes
Using TLS With Rust (Part 2): Client Authentication
Learn more about client authentication with Rust.
January 22, 2019
by
Oren Eini
·
8,550 Views
·
2 Likes
Extracting a Private Key From the Java Keystore (JKS)
Check this out if you need help extracting a private key from a JKS instance.
January 17, 2019
by
Rajind Ruparathna
·
311,285 Views
·
6 Likes
Previous
...
112
113
114
115
116
117
118
119
120
121
...
Next