Ajitesh Kumar

May Your Application R.I.P – Part 1

[adsenseyu2] Didn't really mean that (R.I.P) way, Indeed. :-) The objective behind this series of blogs is to represent some…

12 years ago

OWASP Security Misconfiguration – Classic Example – 1

[adsenseyu2] One of the OWASP top 10 application security vulnerability is Security Misconfiguration. One of the most common way to…

12 years ago

What to Learn on Day One of Application Development

Well, I would surely not recommend you to go over the application code and look for things like classes, interfaces,…

12 years ago

Attention Developers: Take Care of Your Debts

Hmm.. was the title intriguing enough for you to check out if you as a developer got any debts to…

12 years ago

Tips for Newbies to Choose between Technologies

Does the above picture include one of the programming languages you are planning to learn or have started learning? I…

12 years ago

Follow Single Responsibility Principle & You are Home!

Here is an interview with Ajitesh Shukla who has been very passionate about coding all these years and have helped…

12 years ago

New Initiative – Geeks’ Brain’s Picks

We are starting on a new initiative to share the pick of software geeks' brains. The objective is to share…

12 years ago

Tips for Gathering Security Requirements of your Web Application Project

Gathering security requirements in relation with a project, sprint (if agile) is key to deliver secured applications. This is because…

12 years ago

Atlassian Confluence-JIRA Integration to Strengthen Agile Portfolio

Earlier this week, Enterprise software toolmaker Atlassian announced tighter integration between its JIRA issue tracking application and its Confluence team collaboration platform. With this…

12 years ago

Top 7 Security Attack Questions While Analyzing Every Requirement

Following are top 5 security attack related questions that you could ask while analyzing the each requirement in hand, the…

12 years ago

Tips for Designing Security for Your Public APIs

[adsenseyu2] Before we look into tips & techniques to design security for your Public APIs, lets understand what do we…

12 years ago

List of Great Videos on API Design & Development

Following are some of the videos I could gather which presents talks on API design & development. How to Design…

12 years ago

What makes an API, a great API?

[adsenseyu2] Before I start on this blog, lets take a look at the quote, "Being complex is easy, being simple…

12 years ago

A Great API should act as a Building Block!

[adsenseyu2] Following are characteristics of a great API: Building Blocks: APIs consisting of one or more methods should act like…

12 years ago

List of Threat Modeling Tools

Threat modeling tools are used to perform systematic analysis of attack vectors by helping you analyze some of the following…

12 years ago

APIs is the Way to Go, You bet!

[adsenseyu2] Not sure if you are aware or not, but the world is waking up to keywords such as API-First,…

12 years ago