A small Java example (with less than 400 Lines of Code) which demonstrates: How to tunnel... more »
Basically, we don't. Interesting, yet scary at the same time.
We've got an eclectic set of headlines this week that range from the rise of "mega data... more »
The essential guide to Node.js Security.
how to integrate security professionals into the continuous delivery process
From killing critical business systems to ignoring a critical security event, these colossal... more »
Header based stateless token authentication for JAX-RS
While public service and the ability to help people may appeal to some people for a while,... more »
Perfect useful tool to control you Windows server. Keeping your server up to date, server... more »
OAuth is a protocol used to access APIs on behalf of an user but the user does not need to be... more »
Information about how to secure any website..
The distinction that courts draw in general is that a physical thing, like a key to a... more »
Today's web applications expect some RESTful services to provide them with the data they... more »
In this article I am going to throw some light around web service security, user... more »
Java is one of the longest standing and widely deployed enterprise programming languages in... more »
Securing the Insecure
Brief History of OpenID Connect
Did you know that 75% of IT managers report they are currently using or evaluating cloud... more »
Sniff your smartphones wifi communication using Linux and Wireshark by putting a wireless... more »
Cloud computing is a dream-come-true for any small business. It allows many magnificent... more »
One of the major issues faced by the Internet of Things is the question of security. With a... more »
Cyber security can be a difficult task to tackle since the issue is so complicated, with many... more »
It’s so easy to overcome the restrictions Snapchat sets. With just a little skill, it’s... more »
Hierarchical roles offer a lot more flexibility than simple roles. See how to integrate these... more »
my arguments, no bullshit, just the facts ...
Show more links
Discover best practices and the most useful tools for building the ideal integration architecture.
Advertising - Terms of Service - Privacy - © 1997-2014, DZone, Inc.