Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
Top 5 Free Spring Core Professional Certification Mock Exams and Practice Questions
Need help passing the Spring exam?
January 17, 2019
by
Javin Paul
·
61,649 Views
·
11 Likes
Top Microservices Interview Questions and Answers, Part 2
We finish going through the top questions you're likely to encounter when interviewing for a microservices dev role. Read on to freshen up you microservices knowledge!
January 17, 2019
by
Arnab Roy
·
57,495 Views
·
5 Likes
Spring Security 5 Form Login With Database Provider
We look at how to use Spring Security 5 to add authentication/authorization protocols to a Java-based application.
January 16, 2019
by
Yogen Rai
·
111,871 Views
·
10 Likes
Keycloak Cluster Setup With kube_ping
Take a look at how to auto-discover using kube_ping and Keycloak.
January 12, 2019
by
Arvind Rajpurohit
·
18,911 Views
·
7 Likes
OAuth2 Tips: Token Validation
There is a lot to learn about OAuth 2 and token validation — let's take a closer look.
January 11, 2019
by
Nelia Loginova
·
69,034 Views
·
17 Likes
Top 7 REST API Security Threats
Look at the top 7 REST API security threats in today’s IT world in order to become aware of security threats.
January 10, 2019
by
Guy Levin
·
29,756 Views
·
10 Likes
The Right Flow for the Job: Which OAuth 2.0 Flow Should I Use?
Get help choosing the right OAuth 2.0 flow for the job.
January 8, 2019
by
Grzegorz Mirek
·
28,680 Views
·
3 Likes
Using TLS With Rust (Part 1)
Learn more about how one dev was able to debug his own dependencies.
January 7, 2019
by
Oren Eini
·
10,188 Views
·
1 Like
GitHub Security for Repositories: Comparing WhiteSource Bolt, Snyk, Depshield, and GitHub Alerts
Make sure your repos are secure.
January 4, 2019
by
Manjunath M
·
21,173 Views
·
5 Likes
Guide to Integrating OKTA OAuth 2.0 OIDC With Mulesoft API Anypoint Platform (Mule 4)
Learn more about integrating OKTA OAuth 2.0 on your platform.
January 2, 2019
by
Jitendra Bafna
CORE
·
20,958 Views
·
10 Likes
Understanding the Role of Certificate Authorities in PKI
Public Key Infrastructures are not universal.
December 20, 2018
by
Jake Adley
·
12,872 Views
·
3 Likes
How to Limit the Number of Concurrent Active User Sessions Using Spring Security
Use Spring Security to limit the number of concurrent user sessions in your Java apps.
December 19, 2018
by
Javin Paul
·
35,924 Views
·
8 Likes
Using OpenSSL With libuv
Learn more about using libuv to allow more than a single connection per thread — with the help of TLS.
Updated December 13, 2018
by
Oren Eini
·
10,404 Views
·
4 Likes
What Is Shift-Left Testing?
Explore the shift-left methodology and how to shift testing left in your organization.
December 12, 2018
by
Arthur Hicken
·
15,654 Views
·
5 Likes
JVM Calendar: JDPR or Java Data Protection Recommendations
After GDPR, we offer some additional thoughts on data protection within Java applications.
December 12, 2018
by
Erik Costlow
·
10,403 Views
·
3 Likes
The JDKs: Which One to Use?
Need help deciding which JDK is right for you? Look no further.
December 10, 2018
by
Fernando Almeida
·
113,146 Views
·
46 Likes
List of ERP Technologies: What is Right for Your Project?
ERP connects and informs your business with the right solutions.
November 27, 2018
by
Victor Osetskyi
·
48,291 Views
·
3 Likes
Harberger Taxes on Ethereum
Let’s look at Harberger Taxes and how we can use it in decentralized applications.
November 26, 2018
by
Yos Riady
·
12,984 Views
·
2 Likes
Security Best Practices for Managing API Access Tokens
APIs are in everything, so managing their security is paramount. Read on to learn from an expert on integration and application development.
November 21, 2018
by
Isabelle Mauny
·
148,814 Views
·
15 Likes
Mobile Apps, APIs, and Secrets
We take a look at how to secure mobile applications in several different ways, such as user authentication and app attestation.
November 20, 2018
by
Paulo Renato
·
15,559 Views
·
1 Like
Previous
...
113
114
115
116
117
118
119
120
121
122
...
Next