Java is one of the longest standing and widely deployed enterprise programming languages in... more »
Header based stateless token authentication for JAX-RS
A small Java example (with less than 400 Lines of Code) which demonstrates: How to tunnel... more »
OAuth is a protocol used to access APIs on behalf of an user but the user does not need to be... more »
Perfect useful tool to control you Windows server. Keeping your server up to date, server... more »
The essential guide to Node.js Security.
While public service and the ability to help people may appeal to some people for a while,... more »
Information about how to secure any website..
Since the beginning of time, developers have been writing code to store and handle user... more »
This article represents different scenarios related with XSS (cross-site scripting) and how... more »
We've got an eclectic set of headlines this week that range from the rise of "mega data... more »
The distinction that courts draw in general is that a physical thing, like a key to a... more »
Brief History of OpenID Connect
Securing the Insecure
Today's web applications expect some RESTful services to provide them with the data they... more »
From killing critical business systems to ignoring a critical security event, these colossal... more »
In this article I am going to throw some light around web service security, user... more »
how to integrate security professionals into the continuous delivery process
Basically, we don't. Interesting, yet scary at the same time.
Show more links
Discover best practices and the most useful tools for building the ideal integration architecture.
Advertising - Terms of Service - Privacy - © 1997-2014, DZone, Inc.