PinnedShivam JaswalNexus IQ SonatypeVulnerabilities: Understanding and AddressingIn today’s digital world, software plays a critical role in everything we do. However, software can also have vulnerabilities — weaknesses…Mar 16Mar 16
PinnedShivam Jaswal“End-to-End Data Security:Shielding API Payloads through CryptoJS and Java AES-256 Encryption”I have done encryption and decryption for Payload, and as per requirement it can be done for any data or even for encryption of api(url).Aug 25, 2023Aug 25, 2023
PinnedShivam JaswalMongoDB-Basic to Intermediate: A Comprehensive Guide to Installation, Learning, Configuration, and…What is NoSQLMar 31, 20231Mar 31, 20231
PinnedShivam JaswalFortify Scan: How to resolve various potential fortify vulnerabilities.(Content Security Policy, Mass Assignment, Header Manipulation, SQL Injection)Oct 13, 2021Oct 13, 2021
PinnedShivam JaswalBest practices to follow in Angular(or React) UIFor fast-performing web applications based on the Angular framework, it is required to follow certain Angular best practices to keep the…Sep 22, 20221Sep 22, 20221
Shivam JaswalStarting Cloud Computing Journey — Intro to cloud computing and Essentials of cloud computingSimplest DefinitionOct 6, 2022Oct 6, 2022