Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
What Java DAO Layer Is Best for Your Project
Reviewing and comparing the most popular java database access frameworks.
May 18, 2020
by
Dmitry Egorov
CORE
·
32,170 Views
·
12 Likes
Generating OAuth Tokens Part 1
In this article, we'll discuss how to create a basic authorization server that creates tokens given the username and password.
May 18, 2020
by
Vinu Sagar
·
14,339 Views
·
12 Likes
Infrastructure as Code Security
In this article, we begin to understand the basics and challenges behind Infrastructure as Code (IaC) Security.
May 17, 2020
by
Kiran Sangeetam
·
6,872 Views
·
2 Likes
Basic Frontend Dev Environment Setup
In this post, I share a very basic development environment setup which is very useful if you just quickly want to evaluate some functionality.
May 15, 2020
by
Jawad Hasan Shani
CORE
·
11,029 Views
·
3 Likes
Two-Factor Authentication in Spring Webflux REST API
In this article, we discuss how to implement two-factor authentication for a REST API with Spring Webflux.
May 11, 2020
by
Yuri Mednikov
·
12,012 Views
·
5 Likes
Establish Trust Chain From Kafka to Microservices REST APIs With JWT
In this article, we discuss how to establish trust from Kafka event stream processing modules to microservice APIs with Spring Security and JWTs.
May 6, 2020
by
Gary Li
CORE
·
13,766 Views
·
7 Likes
How Microsoft Is Improving Website Security With Machine Learning
In this article, see how Microsoft is improving website security with machine learning.
May 6, 2020
by
Thomas Griffin
·
2,752 Views
·
2 Likes
Secure Communication with Token-based RSocket
Take a look at how you can establish secure communication with token-based RSocket, and establish a clear understanding of JWT.
April 30, 2020
by
Lu Han
·
10,532 Views
·
4 Likes
Implementing Aqua Security to Secure Kubernetes
In this article, we discuss the benefits of and how you can go about implementing Aqua Security to better secure Kubernetes.
April 30, 2020
by
Agustin Romano
·
1,358,078 Views
·
3 Likes
How to Implement JDBC Authentication and Authorization in Mule 4 Using Spring Security
This tutorial walks step-by-step through how to use JDBC authorization in Mule 4 with Spring Security to provide role based security.
April 30, 2020
by
Harsha Pateelu
·
13,730 Views
·
1 Like
Dependency Injection in Spring
Take a deep dive into Dependency Injection in Spring — what it is, how and when to use, and why it makes Spring such a powerful framework.
Updated April 29, 2020
by
Justin Albano
CORE
·
65,836 Views
·
30 Likes
The Do’s and Don’ts of Cloud Computing
When it's time to seriously consider making the jump to the cloud, take a look at this list of some of the migration patterns and anti-patterns.
Updated April 29, 2020
by
Finlead Logiticks
·
9,257 Views
·
4 Likes
Secure Mule API by Auth0 (External Identity Provider)
In this article, take a look at how to secure a Mule API with Auth0.
April 28, 2020
by
Mukesh Thakur
CORE
·
15,679 Views
·
4 Likes
Angular JWT Autorefresh With Spring Boot
In this article, we discuss how to add autorefresh functionality for JWTs in an Angular application with a Spring Boot backend.
April 27, 2020
by
Sven Loesekann
·
15,162 Views
·
5 Likes
Chaos Mesh — A Solution for System Resiliency on Kubernetes
In the following sections, I will share with you what Chaos Mesh is and how we designed and implemented it.
April 22, 2020
by
Chengwen Yin
·
12,761 Views
·
4 Likes
Authentication with Spring Boot and Spring Security — JWT and Postgres
Take a look at how you can create authentication with REST API calls using JSON Web Tokens.
April 21, 2020
by
Aakash Sharma
·
22,774 Views
·
7 Likes
10 IoT Security Tips You Can Use to Secure Your IoT Devices
While IoT devices and tools have a number of uses and can make life a lot easier, many come with a number of security tradeoffs and vulnerabilities.
April 20, 2020
by
Lumena Mukherjee
·
18,268 Views
·
2 Likes
The Cost of Building an Enterprise API Analytics Platform
In this article, take a look at the cost of building an enterprise API analytics platform.
April 16, 2020
by
Derric Gilling
CORE
·
13,963 Views
·
3 Likes
Create a CRUD App With React, Kotlin, and Spring Boot
This in-depth tutorial will go over how to create a secure CRUD application using a combination of ReactJS, Kotlin, Spring Boot, and OpenID.
April 15, 2020
by
Andrew Hughes
·
31,648 Views
·
30 Likes
Ethereum RPCs, Methods, and Calls
In this tutorial, we bring you an in-depth guide to reading and writing requests to the Ethereum blockchain, using Infura.
April 14, 2020
by
Cheryl Douglass
·
11,308 Views
·
3 Likes
Previous
...
102
103
104
105
106
107
108
109
110
111
...
Next