• Início
  • Sobre Mim
  • Contato
  • Security

    AWS Local Authentication: Understanding Your Options and Using IAM User Long-Term Credentials Responsibly

  • Security Spring

    How to Securely Connect Your Spring Boot App to PostgreSQL with AWS Secrets Manager — No More Hardcoded Credentials

  • Uncategorized

    How to Connect Spring Boot to PostgreSQL Using Spring Data JPA

  • Spring

    Exception Handling Like a Pro in Spring Boot REST APIs

  • Introduction to Apache Camel K: Solving Integration Challenges

    Introduction to Apache Camel K: Solving Integration Challenges

    Simplify cloud-native integrations with Apache Camel K

    Continue Reading

    dezembro 17, 2024

    4 min read

  • OAuth2 in Action: Real-World Use Cases and Examples

    OAuth2 in Action: Real-World Use Cases and Examples

    Explore OAuth2’s real-world applications: from social logins to IoT and learn best practices for secure, seamless authorization

    Continue Reading

    dezembro 12, 2024

    4 min read

  • Handling Exceptions in Spring Boot Applications

    Handling Exceptions in Spring Boot Applications

    Master Spring Boot exception handling: global handlers, custom errors, and best practices for secure, user-friendly apps

    Continue Reading

    dezembro 10, 2024

    4 min read

  • OAuth2 Authorization Code Grant Type: A Deep Dive

    OAuth2 Authorization Code Grant Type: A Deep Dive

    A deep dive into OAuth2 Authorization Code Grant: how it works, why it’s secure, and best practices for developers building secure APIs

    Continue Reading

    dezembro 5, 2024

    4 min read

  • Choosing the Right Java Microservices Framework: Spring Boot, Quarkus, Micronaut, and Beyond

    Choosing the Right Java Microservices Framework: Spring Boot, Quarkus, Micronaut, and Beyond

    Spring Boot, Quarkus, Micronaut: How to choose the best microservices framework for your needs?

    Continue Reading

    dezembro 3, 2024

    4 min read

  • Advanced OAuth2: Refresh Tokens and Token Expiration Strategies

    Advanced OAuth2: Refresh Tokens and Token Expiration Strategies

    Master advanced OAuth2 strategies: refresh tokens, token expiration, and Spring Boot examples to secure your applications effectively

    Continue Reading

    novembro 28, 2024

    4 min read

←
1 … 4 5 6 7 8 … 18
→
  • Sobre Mim
  • Contato
  • Política de Cookies
  • Política de Privacidade
  • Termos de Uso

© Igor Venturelli

Manage your privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Sempre ativo
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Gerir opções
  • Gerir serviços
  • Gerir {vendor_count} fornecedores
  • Leia mais sobre esses propósitos
Manage options
  • {title}
  • {title}
  • {title}