Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
Guide to Integrating OKTA OAuth 2.0 OIDC With Mulesoft API Anypoint Platform (Mule 4)
Learn more about integrating OKTA OAuth 2.0 on your platform.
January 2, 2019
by
Jitendra Bafna
CORE
·
21,060 Views
·
10 Likes
Understanding the Role of Certificate Authorities in PKI
Public Key Infrastructures are not universal.
December 20, 2018
by
Jake Adley
·
13,008 Views
·
3 Likes
How to Limit the Number of Concurrent Active User Sessions Using Spring Security
Use Spring Security to limit the number of concurrent user sessions in your Java apps.
December 19, 2018
by
Javin Paul
·
36,087 Views
·
8 Likes
Using OpenSSL With libuv
Learn more about using libuv to allow more than a single connection per thread — with the help of TLS.
Updated December 13, 2018
by
Oren Eini
·
10,512 Views
·
4 Likes
What Is Shift-Left Testing?
Explore the shift-left methodology and how to shift testing left in your organization.
December 12, 2018
by
Arthur Hicken
·
15,767 Views
·
5 Likes
JVM Calendar: JDPR or Java Data Protection Recommendations
After GDPR, we offer some additional thoughts on data protection within Java applications.
December 12, 2018
by
Erik Costlow
·
10,460 Views
·
3 Likes
The JDKs: Which One to Use?
Need help deciding which JDK is right for you? Look no further.
December 10, 2018
by
Fernando Almeida
·
113,298 Views
·
46 Likes
List of ERP Technologies: What is Right for Your Project?
ERP connects and informs your business with the right solutions.
November 27, 2018
by
Victor Osetskyi
·
48,877 Views
·
3 Likes
Harberger Taxes on Ethereum
Let’s look at Harberger Taxes and how we can use it in decentralized applications.
November 26, 2018
by
Yos Riady
·
13,094 Views
·
2 Likes
Security Best Practices for Managing API Access Tokens
APIs are in everything, so managing their security is paramount. Read on to learn from an expert on integration and application development.
November 21, 2018
by
Isabelle Mauny
·
149,242 Views
·
15 Likes
Mobile Apps, APIs, and Secrets
We take a look at how to secure mobile applications in several different ways, such as user authentication and app attestation.
November 20, 2018
by
Paulo Renato
·
15,625 Views
·
1 Like
What Is SSL? How Do SSL Certificates Work?
Ever wondered about the difference between HTTP and HTTPS?
Updated November 19, 2018
by
Lumena Mukharjee
·
60,201 Views
·
20 Likes
JWT: Using the Header and JWS Parameters
Explore the basic components of JWT — headers and JWS parameters.
Updated November 16, 2018
by
Marudhamaran Gunasekaran
·
11,600 Views
·
5 Likes
Access Control Acronyms: ACL, RBAC, ABAC, PBAC, RAdAC, and a Dash of CBAC
There are a lot of acronyms for access control. Let's take a look at some of the most important ones.
Updated November 15, 2018
by
Michael Bissell
·
31,523 Views
·
8 Likes
JUnit 5: Injection Enabled Tests
Learn how to enable dependency injection in your test methods in JUnit's new release, JUnit 5.
November 14, 2018
by
Mehdi Cheracher
·
34,075 Views
·
1 Like
Top 5 Spring Boot Features Java Developers Should Know
Check out these top five Spring Boot features that every Java dev should know about, including auto-configuration, starter dependencies, Spring Boot CLI, and more.
Updated November 13, 2018
by
Javin Paul
·
92,969 Views
·
16 Likes
Kubernetes Demystified: Solving Service Dependencies
Since containers have no contact with services outside themselves, it can be a challenge to address service dependencies.
November 7, 2018
by
Leona Zhang
·
16,324 Views
·
1 Like
Problems Solved by DevOps
DevOps promises speed: delivering value to customers, reducing cycle time, faster time to market, shorter mean-time-to-resolution.
November 3, 2018
by
Tom Smith
CORE
·
19,551 Views
·
1 Like
Biometric Security Jargon: CER, EER, FRR, FAR
Biometrics are at the cutting edge of cybersecurity. Get ahead of the game by learning all the jargon associated with the burgeoning field!
November 3, 2018
by
John Cook
·
22,651 Views
·
1 Like
Apache Kafka Security: Features and Uses of Kafka
Want to learn more about using Apache Kafka Security? Check out this post to learn more about Kafka features and use cases.
October 31, 2018
by
Rinu Gour
·
29,917 Views
·
3 Likes
Previous
...
116
117
118
119
120
121
122
123
124
125
...
Next