Automated testing, as part of DevOps, saves money in developer time and number of defects in the application. Read real-world examples from industry executives. Read all
A backend dev gives a tutorial on how to use Spring Security to implement user impersonation protocols, allowing you to securely access user accounts. Read all
Learn about how to use these software testing patterns for writing code that can be tested without mocks like test doubles, DI frameworks, or end-to-end tests. Read all
Check out how using keystores can help you access and load test your secure websites with multiple client-side and server-side certicficates with JMeter. Read all
This article is a list of 50 Docker variables, succinctly summarized, that will give you more use from the containerization service and show you how to use them best. Read all
A discussion of how to secure Android-based applications from common security vulnerabilities such as Man in the Middle Attacks and Cross-Site Scripting. Read all
A security researcher discusses the concept of open redirection vulnerabilities, how cyberattackers take advantage of this vulnerability, and how to prevent it. Read all
Learn about setting up InfluxDB and the TICK stack and fetching new tweets from the Streaming API in order to monitor cryptocurrency with InfluxDB and Telegraf. Read all
A security expert discusses some best practices to keep in mind when designing and executing a security testing system, and how to secure your test systems. Read all
Using Lombok, Spring Boot, MongoDB, and Spring 5's Reactive capabilities, let's create a web app with basic authentication and routing abilities. Read all
A tutorial on how to create several different types of secure login pages and authentication pages using Java and Spring Boot/Spring Security technology. Read all
When it comes to Dependency Injection, the OSGi framework and its associated bundles can make service listening and registering a quick, clean, simple process. Read all
While cyberattackers operate within the realm of the developer, their goals are less intellectual and more worldly. Read on for info on the costs of a breach. Read all