Don’t Hate the HATEOAS Part Deux: Springtime for HATEOAS

Billy Korando Articles, Development Technologies & Tools, Java, Spring 1 Comment

Attention: The following article was published over 9 years ago, and the information provided may be aged or outdated. Please keep that in mind as you read the post.In the much belated conclusion to my series on HATEOAS, we will be diving into how to implement HATEOAS using Spring-Data-REST and Spring-HATEOAS. It is springtime for HATEOAS! I put together a functioning …

Don’t just randomize, truly randomize!

Vince Pendergrass Articles, Development Technologies & Tools, Java, JavaScript, Security Leave a Comment

Attention: The following article was published over 11 years ago, and the information provided may be aged or outdated. Please keep that in mind as you read the post.The state of web application cryptography has changed, and each development language provides its own way of working with it. I will touch on the current state of random number generation and …

Top 10 Web Application Security Risks From OWASP

Todd Horn Articles, Security Leave a Comment

Attention: The following article was published over 12 years ago, and the information provided may be aged or outdated. Please keep that in mind as you read the post.The Open Web Application Security Project (OWASP) is a worldwide not-for-profit charitable organization focused on improving the security of software. Its mission is to make software security visible, so that individuals and organizations worldwide can …