Have a closer look at two cryptographic algorithms: MD5 (message-digest algorithm) and SHA (Secure Hash Algorithm) and how they compare.
Experienced Java Developer with a demonstrated history of working in the information technology and services industry. Strong engineering professional graduated from Rzeszów University of Technology, Poland. I work full-time as a Fullstack Developer with Java and React. On weekends I share my knowledge as Programming Coach during coding bootcamps.
Here's what I've written (so far):
Learn the difference between Unit Tests and Test-Driven Development.
Learn about SAML 2.0, one of the most common standards used when implementing SSO solutions.
Learn about the REST architecture and its most common applications.
In this article, we’ll elaborate on technical debt and its dangers.
Learn about the difference between symmetric and asymmetric cryptography.
Learn about database design in a microservices architecture.
Explore the virtual memory concept in detail.
Understand how the SSH and SSL protocols compare.
Learn about Behaviour-Drive Development (BDD) and how it differs from TDD