classification
boutiqueSharing tips for java enumeration
1. Introduction Java enumerations are very useful in development. Today, let's analyze a few tips and answer some students 'questions...
Free boutiquePeek operation in Java 8 Stream Api
1. Preface I described the map operation in the Java 8 Stream API in the detailed usage guide of the Java 8 Stream API...
Free boutiqueFutureTask 2 in Java
1. The first two chapters of the preface briefly analyze the Future interface and FutureTask. This article will introduce the use of FutureTask...
Free boutiquePrinciples of Vernacular Design Models
Why design patterns are needed
In fact, we can complete the development work without a design pattern. But why design...
Free boutiqueWould you rather know introspection if you only know java reflection?
1. Foreword In the previous article, we encapsulated a Mybatis universal Mapper. To get entity class attributes, I used...
Free boutiqueHow Java handles NPE issues gracefully
1. Foreword For Java developers, null is a troublesome type, and NPE can occur if you are not careful...
Free boutiqueJava Development Tips: Reduce the Use of Magic Points
1. Preface When refactoring old code, I encountered similar writing:
public void attend(String value)...
Free boutiqueSummary of core knowledge of java annotation
1. preface
A few years ago, our project was still running on structs 2, and once I asked a colleague if he knew
Spring...
Free exclusiveBlack Box Penetration Testing Guide: SQL Injection
Test using automated scanning tools
Tools:AppScan,WebInspect,AWVS, etc.
Test method: Use automatic...
Free boutiqueSeveral ways to remove elements from Java Collection
1. The preface operation set is something Java programmers repeat almost every day. Today let's study...
Free boutiqueUnder what circumstances cannot Java generics be used
1. Introduction Java 1.5 introduces generics to ensure type safety, prevent type conversion exceptions at run time, and allow classes to...
Free boutiqueJava random number traps
preface
We should be familiar with random numbers. We use them to generate Captcha in business, or we have low requirements for repeatability...
Free exclusiveBlack Box Penetration Testing Guide: XML Injection
I. attack scenarios
Send XML requests directly
described
Many application systems or components require...
Free boutiqueFull analysis of Collectors in java8
1. The preface mentioned Collectors in an article about Collection removal elements yesterday. Believe a lot...
Free