Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
How to Secure APIs
Learn about authentication, rate-limiting, and more.
July 19, 2019
by
Tom Smith
CORE
·
36,479 Views
·
7 Likes
Most Important Security Elements (Part 1)
Visibility, mitigation, prioritization, and encryption — these are the most important elements to security right now.
Updated July 18, 2019
by
Tom Smith
CORE
·
29,457 Views
·
6 Likes
Most Effective Security Techniques (Part 1)
Creating a security culture supported by training, good hygiene, and processes are mentioned most frequently as effective security techniques.
Updated July 18, 2019
by
Tom Smith
CORE
·
13,633 Views
·
3 Likes
Keys to API Management
Security, ease of use, analytics, and lifecycle management.
July 17, 2019
by
Tom Smith
CORE
·
14,126 Views
·
3 Likes
Microservices Architecture With Spring Boot and Spring Cloud
Learn more about building a microservices architecture with Spring Boot and Spring Cloud.
July 16, 2019
by
Matt Raible
·
264,412 Views
·
22 Likes
Top 5 Free Courses to Learn Blockchain Programming
Want to learn more about blockchain — for free?
July 12, 2019
by
Javin Paul
·
42,045 Views
·
4 Likes
Dependency Management and Versioning With a Maven Multi-Module Project
Learn more about basic dependency management and versioning with Maven.
Updated July 11, 2019
by
Avraam Piperidis
·
116,200 Views
·
14 Likes
The Problem of String Concatenation and Format String Vulnerabilities
String concatenations can lead to major format string vulnerabilities in low-level programming languages.
July 10, 2019
by
Sven Morgenroth
·
24,311 Views
·
2 Likes
Security Application Use Cases
Use cases are prevalent in data protection and GDPR.
Updated July 10, 2019
by
Tom Smith
CORE
·
2,465 Views
Build a Spring Boot App With Secure Server-to-Server Communication Via OAuth 2.0
How to build a Spring Boot App for server-to-server communication via the OAuth 2.0 Client Credentials Grant type.
Updated July 8, 2019
by
Brian Demers
·
58,203 Views
·
17 Likes
Learn How to Use JUnit 5 to Test Your Spring Boot Apps
Guide on creating, securing, and testing a Spring Boot application with JUnit 5, covering REST API setup, OAuth 2.0 implementation, and unit/integration testing.
Updated July 2, 2019
by
Lindsay Brunner
·
87,448 Views
·
27 Likes
4 Spring Annotations Every Java Developer Should Know
Here are the most important Spring annotations that every Java developer should know.
July 1, 2019
by
Justin Albano
CORE
·
67,726 Views
·
67 Likes
DBMS_JOB — Watching for Failures
If you rely on jobs submitted via DBMS_JOB to fail, then read on.
June 28, 2019
by
Connor McDonald
·
11,940 Views
·
2 Likes
DevSecOps Keys to Success
The most important elements of a successful DevSecOps implementation are automation, shifting left, and collaboration.
Updated June 26, 2019
by
Tom Smith
CORE
·
18,916 Views
·
4 Likes
Mitigate Slow HTTP GET/POST Vulnerabilities in the Apache HTTP Server
Learn how you can mitigate slow HTTP GET/POST vulnerabilities in the Apache HTTP Server.
June 26, 2019
by
Ian Muscat
·
16,849 Views
·
1 Like
3 Books and Courses to Learn Spring Security 5 in Depth
Here are the top three resources for learning Spring Security.
Updated June 24, 2019
by
Javin Paul
·
20,358 Views
·
8 Likes
Learn How to Secure Service-to-Service Microservices
You've built a microservices architecture, but have you secured your service-to-service communication? If not, read on to learn how!
June 24, 2019
by
Matt Raible
·
56,368 Views
·
23 Likes
Using PowerMock to Mock Static Methods
What happens when you aren't able fo fall back on dependency injection? Take a look at this example of how PowerMock can help.
June 19, 2019
by
Roger Hughes
·
307,158 Views
·
13 Likes
Chaos Testing Your Microservices With Istio
In this post, we discuss the idea of chaos testing and how to perform fault injection with Istio to make sure your microservices are resilient.
June 17, 2019
by
Samir Behara
CORE
·
11,816 Views
·
6 Likes
Developing Peer-to-Peer Lending Platform on Blockchain
Get ready for the disruption in peer-to-peer lending process with the blockchain technology.
June 17, 2019
by
Akash Takyar
·
8,474 Views
·
4 Likes
Previous
...
111
112
113
114
115
116
117
118
119
120
...
Next