Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
Ensuring the Security of Your APIs
Learn about API types, types of clients, and techniques for protecting their information in this in-depth look at security practices for APIs.
Updated June 4, 2019
by
Vivek Yadav
·
40,182 Views
·
17 Likes
Intrusion Protection With Kubernetes
While Kubernetes has built-in protection tools, there may be more that you need to do to secure your software.
June 3, 2019
by
JP La Torre
·
9,117 Views
·
1 Like
Database Concerns
The biggest concerns regarding databases today are around security and complexity.
May 29, 2019
by
Tom Smith
CORE
·
6,594 Views
·
1 Like
JWT Token: Lightweight, Token-Based Authentication
Securing your website is the goal of every developer.
May 29, 2019
by
Sovan Misra
·
23,763 Views
·
12 Likes
Spring Boot Security + JWT ''Hello World'' Example
Learn how to secure your Spring Boot apps using a JSON Web Token.
May 24, 2019
by
Rida Shaikh
·
630,450 Views
·
61 Likes
View Component or Tag Helper?
View components and tag helpers are nice features of ASP.NET Core that allow us to encapsulate some UI logic and avoid repeating the same code in different views.
May 23, 2019
by
Gunnar Peipman
·
11,371 Views
·
2 Likes
JKS: Extending a Self-Signed Certificate
Learn more about extending self-signed certificates with the Java keystore.
Updated May 22, 2019
by
Bozhidar Bozhanov
·
14,073 Views
·
2 Likes
Secure Your JHipster App With Social Login
Social login and JHipster, together, offer a simple and secure option for your customer-facing app.
May 22, 2019
by
Andrew Hughes
·
9,384 Views
·
2 Likes
Fluree: Blockchain, GraphQL, and More: All in One Database
Learn more about Fluree and listen to an interview one of our Zone Leaders had with Co-CEO Brian Platz.
Updated May 21, 2019
by
Chris Ward
CORE
·
14,734 Views
·
3 Likes
Encryption, Part 3: Hybrid Encryption
Looking for the best of both worlds when it comes to symmetric and public/private key encryption?
May 21, 2019
by
Bipin Patwardhan
·
14,947 Views
·
1 Like
Build a Simple Spring Boot App With Spring Data JPA and Postgres
Need help building a simple Spring Boot app with Spring Data JPA and Postgres?
May 17, 2019
by
Andrew Hughes
·
29,762 Views
·
12 Likes
Integrating Spring Boot and React With Spring Security: Basic and JWT Authentication
Look at this in-depth tutorial on how to integrate Spring Boot and React with Spring security.
Updated May 16, 2019
by
Ranga Rao Karanam
·
116,776 Views
·
4 Likes
Build Secure Microservices in Your Spring REST API
Here's how a secure Spring REST API can reduce some of the pain points when building a microservices architecture.
Updated May 16, 2019
by
Lindsay Brunner
·
69,603 Views
·
21 Likes
How to Get Autocomplete for Maven Dependencies in IntelliJ [Video]
Learn how to autocomplete your Maven dependencies properly with IntelliJ.
May 16, 2019
by
Marco Behler
CORE
·
11,333 Views
·
6 Likes
Spring Boot vs. Spring MVC vs. Spring: How Do They Compare?
Spring, Spring Boot, Spring MVC, there are springs everywhere! Let's walk through where and when you should apply each of these tools.
Updated May 13, 2019
by
Ranga Karanam
CORE
·
257,375 Views
·
84 Likes
Blockchain Vs Tangle: Which Is Better?
Let's look at different cryptocurrency platforms and which is the best.
Updated May 10, 2019
by
John Ryan
·
20,489 Views
·
5 Likes
How to Build a TCP Application With Node.js on ECS
Learn how to create a working TCP application which accepts TCP client connections, listens for data on them, and echoes it back to the client.
May 10, 2019
by
Leona Zhang
·
17,553 Views
·
1 Like
Java Annotated Monthly — May 2019
From security to women in tech — this month's Java Annotated Monthly has it all.
Updated May 10, 2019
by
Trisha Gee
·
14,261 Views
·
6 Likes
Real-World Refactoring: Dependency Injecting a Non-ORM Repository for ASP.NET Core
In this post, a developer shows how to refactor some old code to include dependency injection for .NET Core.
May 9, 2019
by
Jonathan Danylko
·
9,394 Views
·
2 Likes
OAuth 2 Access Token Usage Strategies for Multiple Resources (APIs): Part 1
Let's explore OAuth 2 Access Token usage strategies for multiple resources.
May 9, 2019
by
Robert Broeckelmann
·
43,249 Views
·
7 Likes
Previous
...
111
112
113
114
115
116
117
118
119
120
...
Next