If security vulnerabilities occur, the product/project/company will be damaged. Loss of reputation, Loss of customers Sensitive data loss, Things to know about exploitation: Code written without the concern of developing secure software increases the risk of security vulnerabilities. A vulnerability can be exploited by malicious people/software. Exploitation can be a breach, damage or leak. After… Continue reading Why is Secure Software Development necessary?
Hi everyone, we will be talking about Redis. What is Redis? Why do I need Redis? Where do I use Redis? Redis is an open-source NoSQL (Not Only SQL) database that is becoming increasingly popular, keeping data as a key value. Redis supports a lot of data types(JSON, XML, etc.). Redis stores all data in… Continue reading What is Redis?
Hi everyone, We will be talking about how to authorization management with Spring Security. We will learn how to use basic Spring Security Framework and Swagger configuration. What is Swagger? Simply, an important purpose of Swagger is to provide an interface for Rest Api. You will see Swagger Interface instance on the bottom this article.… Continue reading Authorization Management with Spring Security