Need help finding the current logged-in username in Spring Security? Check out this post to learn how using the SecurityContext and SecurityContextHolder classes.
Learn the basics of artificial network architectures and how to use Convolutional Neural Networks to help malware analysts and information security professionals detect and classify malicious code.
Wonder why so many companies are getting hacked? Check out this post to learn more about recent security breaches and what can be done to combat these attacks.
In this article, we will go through how to use embedded PostgreSQL in your local development environment plus how to use it for DAO integration/unit testing.
Want to learn more about how to manage user sessions with the Spring JDBC Session? Check out this post to learn how to enable Spring Session on your app.
Want to learn more about digital hashing and digital signature? Check out this guide to the different types of DS algorithms used for security purposes.
According to one developer, static classes are evil. Click here to learn more about one dev's approach to static classes and keeping dependencies explicit.
Want to learn more about these best practices for AWS Security Groups? Check out this post to learn more about AWS resources and how you can protect your data.
Want to learn more about the OSI model layers? Check out this post to learn more about the layers of the OSI model and how to mitigate DDoS vulnerabilities.