Spring Security Cache Control Headers

In this article of Spring security tutorial, we will inspect the Spring Security cache control headers. We will look at the default behavior of Spring security along with a way to change the cache control headers in Spring Security. Spring Security Cache Control Headers Security involves a lot of precautions to save the data. There … Read more

Spring Boot With H2 Database

In this article, we will see how to use Spring Boot with H2 Database.Just like other databases, there’s full intrinsic support for it in the Spring Boot ecosystem. Spring Boot with H2 Database H2 database is a relatively new and an open-source, in-memory relational database management system that is written in Java. Just like other … Read more

Custom Filter in Spring Security

In this article, we will look at adding a custom filter in Spring Security. We will see the various use cases to add a custom filter in Spring security along with what are the different options to add a filter with Spring Security. 1. Custom Filter in Spring Security As we know that Spring security … Read more

AVL Tree

In this article, we are going to cover the AVL tree and what makes them so special and so difficult to implement. We will also see the balance factor and rotations required to make this a balanced binary tree. Finally, we will code the AVL tree in Java. 1. What is AVL Tree? AVL tree … Read more

Spring Boot JPA

In this article, we will look at the Spring Boot JPA. We will see how to use Spring Boot to configure and setup support for JPA using Spring Data JPA. Spring Boot JPA Spring Boot auto-configuration provides a lot of flexibility and configuration, which makes it easy-to-use Spring Boot JPA out of the box. Before … Read more

Spring Security Custom Authentication Provider

In this article, we will get an understanding of Spring Security custom authentication provider. There are many use cases where the standard Authentication provider will not fulfill our need and we may need to create custom authentication provider for our Spring security application to get additional flexibility. Spring Security Custom Authentication Provider Before we get … Read more

Java Collections Framework

In this article, we are going to understand Java collections and its various implementations like List, Queue, and Set. We will also cover Java Maps and its implementations. We will also see the benefits of the collection. Last, we will cover the collection improvement in Java 8, and cover a bit about Stream API. Java … Read more

Spring Security Authorization – How authorization work

In this article , we will take a closer look at the Spring security authorization workflow and architecture. This is part of our spring security tutorial, so make sure you are following the complete series for better understanding. Spring Security Authorization In the previous part of this series, we saw how Authentication works with Spring … Read more

ArrayList contains() Method

The arraylist contains() method is used to check if a specific value exists in an ArrayList or not. In this post, we will learn how to use ArrayList contains() method with examples. ArrayList contains() Method Below is the syntax of the contains() method, defined in ArrayList class: This method takes one object as its parameter. … Read more

Doubly linked list in Java

In this article, we are going to understand what a doubly linked list is. We will also see insertions, deletions, and search in a doubly linked list. We will also implement a doubly linked list in Java. What is a Doubly linked list in Java A Doubly Linked List (DLL) contains two pointers instead of … Read more

Spring Security Roles and Permissions

In our last article, we talked about Granted Authority vs Role. In this article, we will look at the Spring security roles and privileges and how to use this feature to build your application. Spring Security Roles and Permissions There are multiple parts of an enterprise application, and it allows not all users to access … Read more

Linked List Data Structure

In this article, we are going to understand what is a linked list and its variations. We will also see insertions, deletions, and search in a linked list. We will also see a linked list implementation in Java. Linked List Linked List is one of most used and common data structures made of a sequence … Read more

Red Black Tree

In this article, we will look at the red black tree data structure and its different properties.Red black tree is an important data structure and provides a lot of benefits and advantages. 1. Red Black Tree A red black tree is a self-balancing binary search tree where each node has an extra bit containing the … Read more

Deleting Node from Binary Search Tree

In this series of binary search tree, we will learn steps for deleting node from binary search tree. We will also see how to delete node from binary search tree in Java.Deleting node from binary search tree is more complicated than other operations on BST. Deleting Node from Binary Search Tree Deleting from binary search … Read more

Searching in a Binary Search Tree

In this article of binary search tree, we will look at searching in a binary search tree. We have already seen how to add an element to Binary search tree and this will focus on the searching element in binary tree. 1. Searching in a Binary Search Tree We will use some properties of the … Read more

Binary Search Tree in Java

In this article, we will take a deeper look at the binary search tree in Java.We will see how to implement the binary search tree in Java and what are its different characteristics. 1. What is Binary Tree Before we get in the details of the binary search tree in Java and how to implement … Read more

Spring Security with Thymeleaf

In this article of Spring security tutorial, we will look at the Spring Security with Thymeleaf. We will see how to use the Thymeleaf spring security dialect to handle the frontend details for our application. Spring Security With Thymeleaf While working on the web application, we will get in to situation where we like to … Read more