Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
Five Best Practices for GoLang CI/CD
Create CI/CD workflows with Artifactory and GoLang.
August 6, 2019
by
Ankush Chadha
·
14,964 Views
·
3 Likes
Decision Diffie-Hellman DDH and CDH
Easily handle DDH and CDH issues.
August 2, 2019
by
John Cook
·
5,079 Views
·
2 Likes
Secrets Manager in Anypoint Platform
Learn more about Secrets Manager in Anypoint Platform.
July 31, 2019
by
Nitin Gupta
CORE
·
16,497 Views
·
6 Likes
Add Login to Your Spring Boot App in 10 Mins
Learn more about building form-based authentication into your Spring Boot 2.1 app.
July 30, 2019
by
Andrew Hughes
·
166,151 Views
·
16 Likes
DuckDuckGo Has a Privacy Problem
Potential privacy issues in DuckDuckGo.
July 29, 2019
by
Christian Stewart
·
186,818 Views
·
2 Likes
Open ID Connect Authentication With OAuth2.0 Authorization
How Open ID Connect and OAuth2.0 allow for full-authentication.
July 26, 2019
by
Hanil Kathuria
·
32,079 Views
·
11 Likes
Cloud vs. On-Premise Software Deployment – What’s Right for You?
As the two main methods of software deployment, it's important to compare both cloud and on-premise deployment to see what's best.
July 25, 2019
by
David Hallinan
·
24,524 Views
·
3 Likes
Package Signing in PIP
Do we need to automate package signing in PIP for PyPi?
July 24, 2019
by
Prahlad Yeri
·
9,001 Views
·
1 Like
Serverless Multi-Tier Architecture on AWS
AWS's serverless tools enable developers to create a connected multi-tier architecture for easily maintainable and scaleable applications.
July 24, 2019
by
Aarti Parikh
·
13,594 Views
·
7 Likes
Using Jakarta Security on Tomcat and the Payara Platform
Learn how to get started with Jakarta Security on Tomcat and Payara.
July 23, 2019
by
Arjan Tijms
·
5,840 Views
·
4 Likes
API Use Cases
What are some real-world problems APIs are solving?
Updated July 23, 2019
by
Tom Smith
CORE
·
17,230 Views
·
4 Likes
How to Secure APIs
Learn about authentication, rate-limiting, and more.
July 19, 2019
by
Tom Smith
CORE
·
36,355 Views
·
7 Likes
Most Important Security Elements (Part 1)
Visibility, mitigation, prioritization, and encryption — these are the most important elements to security right now.
Updated July 18, 2019
by
Tom Smith
CORE
·
29,367 Views
·
6 Likes
Most Effective Security Techniques (Part 1)
Creating a security culture supported by training, good hygiene, and processes are mentioned most frequently as effective security techniques.
Updated July 18, 2019
by
Tom Smith
CORE
·
13,560 Views
·
3 Likes
Keys to API Management
Security, ease of use, analytics, and lifecycle management.
July 17, 2019
by
Tom Smith
CORE
·
14,013 Views
·
3 Likes
Microservices Architecture With Spring Boot and Spring Cloud
Learn more about building a microservices architecture with Spring Boot and Spring Cloud.
July 16, 2019
by
Matt Raible
·
264,261 Views
·
22 Likes
Top 5 Free Courses to Learn Blockchain Programming
Want to learn more about blockchain — for free?
July 12, 2019
by
Javin Paul
·
41,949 Views
·
4 Likes
Dependency Management and Versioning With a Maven Multi-Module Project
Learn more about basic dependency management and versioning with Maven.
Updated July 11, 2019
by
Avraam Piperidis
·
115,832 Views
·
14 Likes
The Problem of String Concatenation and Format String Vulnerabilities
String concatenations can lead to major format string vulnerabilities in low-level programming languages.
July 10, 2019
by
Sven Morgenroth
·
24,228 Views
·
2 Likes
Security Application Use Cases
Use cases are prevalent in data protection and GDPR.
Updated July 10, 2019
by
Tom Smith
CORE
·
2,399 Views
Previous
...
109
110
111
112
113
114
115
116
117
118
...
Next