Spring Boot Reactive Tutorial

Using Lombok, Spring Boot, MongoDB, and Spring 5's Reactive capabilities, let's create a web app with basic authentication and routing abilities. Read all

Example of Multiple Login Pages With Spring Security and Spring Boot

A tutorial on how to create several different types of secure login pages and authentication pages using Java and Spring Boot/Spring Security technology. Read all

OSGi Dependency Injection

When it comes to Dependency Injection, the OSGi framework and its associated bundles can make service listening and registering a quick, clean, simple process. Read all

5 Consequences That Result From Not Meeting Data Security Requirements

While cyberattackers operate within the realm of the developer, their goals are less intellectual and more worldly. Read on for info on the costs of a breach. Read all

Log (CRLF) Injection with SLF4J

Security is important. But too much security can lead a company to paranoia, or shoot you in the foot. In this article, we take on log injection as an example. Read all

How to Load Test SAML SSO Secured Websites with JMeter

Read all

Apache Karaf Features for OSGi Deployment

Read all

What You Should Know About NODE_ENV

Read all

Microservices and Kerberos Authentication

Read all

How to Make Sure Your Mobile App is Secure

Mobile app development has become vital for enterprises as they look to support new devices (phones, tablets, wearables, etc.) for internal use while also... Read all

 

 

 

 

Top