Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
MEAN Stack and Startups: Are they Made for Each Other?
Of all the web stacks, the MEAN stack is considered one of the best frameworks to use. Read on to learn more about this web stack.
February 27, 2019
by
Lalit Singla
·
9,493 Views
·
2 Likes
REST API Security Vulnerabilities
With its increasing popularity, REST APIs pose major security challenges.
February 27, 2019
by
Hari Subramanian
·
39,733 Views
·
15 Likes
4 Chatbot Security Measures You Absolutely Need to Consider
Are your chatbots secure?
February 25, 2019
by
Paul Pinard
·
17,470 Views
·
4 Likes
Breaking Static Dependency: How to Make Code Testable
Learn how you can make code with static dependencies testable.
February 19, 2019
by
Gunnar Peipman
·
22,097 Views
·
3 Likes
Monitoring Microsoft Azure With Logz.io
Take a look at how you can monitor your Azure instance and create dashboards with other integrations.
February 19, 2019
by
Daniel Berman
·
8,945 Views
·
1 Like
The Mystery Behind Testing ''The Integration of Payment Gateways''
Ever wondered how to test payment gateway integrations effectively?
February 15, 2019
by
Sadhvi Singh
·
20,502 Views
·
4 Likes
Getting Started With Serenity BDD and Cucumber 4
Whether your preferred design pattern is Page Objects, Lean Page Objects, or another one, here's how to write automated tests with Serenity BDD.
February 15, 2019
by
John Ferguson Smart
·
44,263 Views
·
5 Likes
Dependency Injection in .NET Core Console Applications
We take a look at how to implement dependency injection in smaller .NET Core apps, while also addressing the challenges of doing this in larger, real-world applications.
February 15, 2019
by
Gunnar Peipman
·
81,515 Views
·
5 Likes
Spring Boot and OAuth2: Getting the Authorization Code
Need help implementing Spring Boot and OAuth2?
February 14, 2019
by
Vijay Maniyar
·
112,008 Views
·
24 Likes
A Simple Checklist for Apache Ignite Beginners
If you're just starting with this great open source framework, don't worry, we're here to help. Check out this great resource to help get you going.
February 13, 2019
by
Shamim Bhuiyan
·
24,013 Views
·
5 Likes
Vulnerability Threat Control Paradigm and CIA Triads – Computer Security
Learn more about the Vulnerability Threat Control Paradigm.
February 13, 2019
by
Arslan ud Din Shafiq
·
13,406 Views
·
2 Likes
IoT-Enabled Embedded Web Server Reference Example
Embedded HTTP and WebSocket servers have been designed specifically for tiny microcontrollers with limited resources.
Updated February 12, 2019
by
Wilfred Nilsen
·
30,972 Views
·
5 Likes
Using TLS With Rust: Authentication
Learn how to implement the authentication portion of your network protocol in Rust.
February 12, 2019
by
Oren Eini
·
7,693 Views
·
3 Likes
Using TLS in Rust: Getting Async I/O With tokio (Part 2)
Check out this second installment on using Async I/O and tokio!
February 8, 2019
by
Oren Eini
·
9,378 Views
·
2 Likes
Password Encoder Migration With Spring Security 5
Learn more about implementing the password encoder migration with Spring Security 5.
February 7, 2019
by
Marcos Barbero
CORE
·
36,111 Views
·
11 Likes
Trust Models for Secure Network Connections
Explore the concept of trust in cryptography.
February 4, 2019
by
Andrii Fedotov
·
14,186 Views
·
1 Like
Applying Hexagonal Architecture to a Symfony Project
We look at how the hexagonal architecture promotes maintainable, clean, and testable code before showing how to use it in a PHP-based project.
February 1, 2019
by
Javier Gomez
·
20,161 Views
·
2 Likes
The Importance of Security in the Current Cryptocurrency Space
In the cryptocurrency space, the need to have improved safeguards is critical.
January 31, 2019
by
Amit Dua
·
7,164 Views
·
1 Like
What Is Asymmetric Encryption?
Learn what asymmetric encryption is, how it works, and what it does.
January 31, 2019
by
Jake Adley
·
19,430 Views
·
1 Like
Server Name Indication (SNI) and Ingress TLS in Kubernetes with Ambassador
SNI is a great security feature to have to help enable the serving of multiple certificates on from a single IP.
January 30, 2019
by
Daniel Bryant
·
8,884 Views
·
1 Like
Previous
...
114
115
116
117
118
119
120
121
122
123
...
Next