How to Configure TLS/SSL With PEM Files

Learn how to easily set up TLS/SSL for your favorite http client while using PEM files. Read all

Fear-Based Leadership: 9 Signs You Are Leading From Fear

Are you a leader who leads with fear? If you're not sure, check out what this article has to say about signs you're more fearful than fearless. Read all

DevOps Fast Forward with Go

Go is a perfect fit for the DevOps community. Along with some real-world cases, let's see some features that make it shine in the DevOps world. Read all

API Authentication: Implementation of Best Practices

This article addresses a number of the best practices for implementing API security, including OAuth 2.0, API keys, usernames and passwords, and more. Read all

Strategies in C to Avoid Common Buffer Overflow Errors

How can you avoid common buffer overflow errors in C? Check out this strategy to prevent future vulnerabilities and ensure better security. Read all

How to Use Java to Build Single Sign-on

This article demonstrates how to use Java to build a single sign-on application with two client applications and a single resource server. Read all

Securing Web Apps Using PKCE With Spring Boot

Dive into securing your web apps with OAuth 2.0 and OpenID Connect using PKCE, Okta, and Spring Boot. Read all

Penetration Test Types for (REST) API Security Tests

Penetration testing for REST API security provides a comprehensive testing method and is supported by a number of open source and proprietary tools. Read all

Best Practices for Dependency Injection With Spring

In this post, we are going to show you how to use Project Lombok for best practices in dependency injection with the Spring Framework. Read all

The Relationship Between Modularity and Polymorphism

In this article, we discuss fundamental concepts behind modularity and polymorphism to provide readers a stronger understanding of Object-Oriented Design. Read all

 

 

 

 

Top