DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workkloads.

Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

Look Inside
DZone's Guide to

Security: Defending Your Code

As software attacks become more frequent and severe, it’s becoming more and more important to understand the top threats and how to protect against them. The 2018 DZone Guide to Security: Defending Your Code covers going beyond shifting left to protect applications, how to reduce hacker risk, and how AI takes security to the next level.

Free 54-page ebook
Download
8.8K

Table of Contents

2
Executive Summary
4
Key Research Findings
7
Security Through Blockchain
12
Why Are So Many Companies Getting Hacked, and What Can Be Done About It?
16
Securing Embedded Systems
19
How AI Takes Cybersecurity to the Next Level
24
Beating the Cost, Time, and Quality Equation With OWASP ZAP Automation
27
Diving Deeper Into Security
30
'Shift Up': New Security Considerations for Containers-as-a-Service and Serverless Architectures
32
Apply These Best Practices to Secure Android and iOS Mobile Apps
36
Overview and Evolution of Virtual Patching
38
Executive Insights on the Current and Future State of Security
41
Solutions Directory
51
Glossary
Download

Featured Authors

Justin Albano
Software Engineer, IBM
Brian Kelly
Head of Conjur Engineering, CyberArk
Christopher Lamb
Distinguished Member of Technical Staff, Sandia National Laboratories
Frederic Jacquet
Technology Evangelist - AI Ethics
James McDermott
Senior Infrastructure Architect, Dropsource
Tsvi Korren
Chief Solutions Architect, Aqua Security
Katie Strzempka
VP of Customer Success and Services, NowSecure
Apostolos Giannakidis
Tom Smith
Help companies use data and technology to improve UX/CX while reducing costs.

Interactive Preview

Download

Publications

  • Featured
  • Latest
  • Popular

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: