Tagged articles
38 articles
Page 1 of 1
ITPUB
ITPUB
Jan 10, 2026 · Information Security

How Oracle Secures Databases: Deep‑Defense Strategies and Domestic DB Comparison

This article examines the multi‑layered threats facing modern databases, outlines Oracle's comprehensive security capabilities—from firewalls and encryption to auditing and immutable tables—and compares them with the security features of leading domestic database products.

Database SecurityOracleaccess control
0 likes · 27 min read
How Oracle Secures Databases: Deep‑Defense Strategies and Domestic DB Comparison
Java High-Performance Architecture
Java High-Performance Architecture
Sep 21, 2024 · Backend Development

Master MyBatis-Mate: Advanced Features for Secure, Sharded Java Backends

This article introduces MyBatis‑Mate, an enterprise‑grade MyBatis extension that provides sharding, data auditing, sensitive‑word filtering, field encryption, dictionary binding, dynamic DDL maintenance, data‑scope permissions and performance monitoring, complete with practical code examples and configuration guidance.

JavaMyBatisdata encryption
0 likes · 15 min read
Master MyBatis-Mate: Advanced Features for Secure, Sharded Java Backends
Architecture Digest
Architecture Digest
Aug 29, 2024 · Backend Development

mybatis-mate – Enterprise‑level MyBatis Extension for Sharding, Auditing, Encryption, and Data Permissions

The article introduces mybatis-mate, an enterprise‑grade MyBatis module that supports sharding, multi‑datasource, data auditing, field encryption, sensitive‑data masking, automatic DDL maintenance, performance logging, and fine‑grained data‑scope control, providing code examples and configuration guidelines for Spring Boot projects.

Backend DevelopmentData AuditingJava
0 likes · 15 min read
mybatis-mate – Enterprise‑level MyBatis Extension for Sharding, Auditing, Encryption, and Data Permissions
Selected Java Interview Questions
Selected Java Interview Questions
Jul 20, 2024 · Backend Development

Introduction and Usage Guide for MyBatis-Mate: Enterprise Features for MyBatis-Plus

This article introduces MyBatis-Mate, an official MyBatis‑Plus extension offering enterprise‑level capabilities such as dictionary binding, field encryption, data masking, dynamic DDL maintenance, sharding, multi‑datasource switching, performance logging, and data permission control, with detailed Spring Boot integration examples.

BackendJavaMyBatis
0 likes · 15 min read
Introduction and Usage Guide for MyBatis-Mate: Enterprise Features for MyBatis-Plus
Software Development Quality
Software Development Quality
Jul 10, 2024 · Information Security

How to Secure Mobile Apps: Comprehensive Package and Data Security Testing Guide

This article outlines a thorough mobile application security testing methodology, covering installation package verification, code obfuscation checks, signature validation, integrity and permission audits, sensitive data handling, keyboard hijacking, account protection, communication encryption, component exposure, and server-side vulnerability assessments such as SQL injection and CSRF.

Mobile Securityapp testingcode obfuscation
0 likes · 11 min read
How to Secure Mobile Apps: Comprehensive Package and Data Security Testing Guide
Architect
Architect
Mar 13, 2024 · Information Security

11 Essential Practices to Secure Your APIs – From Validation to Risk Control

This article outlines eleven practical techniques for protecting API endpoints, covering parameter validation, unified response wrapping, XSS escaping, captcha integration, rate limiting, IP whitelisting, sensitive‑word checks, HTTPS adoption, data encryption, and comprehensive risk control measures, each illustrated with concrete code snippets and step‑by‑step workflows.

API SecurityHTTPSParameter Validation
0 likes · 18 min read
11 Essential Practices to Secure Your APIs – From Validation to Risk Control
php Courses
php Courses
Aug 2, 2023 · Frontend Development

Implementing Data Encryption and Secure Transmission in Vue Applications

This article explains how to protect user data in Vue applications by using HTTPS, encryption algorithms, hash functions, and digital signatures, providing practical code examples for setting up an HTTPS server with Node.js/Express, encrypting data with crypto‑js, and verifying data integrity.

cryptojsdata encryptionfrontend security
0 likes · 5 min read
Implementing Data Encryption and Secure Transmission in Vue Applications
Huolala Tech
Huolala Tech
Jun 9, 2023 · Information Security

How to Implement Enterprise-Scale Data Encryption: Lessons from Huolala

This article outlines a comprehensive approach to large‑scale data encryption, covering background regulations, data discovery, solution selection, key management, algorithm choices, implementation techniques, incremental controls, and metrics to ensure secure and efficient encryption across thousands of services and billions of records.

Security Architectureapplication-layer encryptiondata encryption
0 likes · 12 min read
How to Implement Enterprise-Scale Data Encryption: Lessons from Huolala
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
May 24, 2023 · Information Security

How to Scale Data Encryption Across Millions of Services: A Practical Roadmap

This article details a comprehensive, multi‑stage approach to implementing data encryption at scale—covering data discovery, solution selection, application‑layer and proxy‑layer encryption, key management, algorithm choices, incremental migration, and measurable metrics—to help enterprises protect sensitive data while balancing performance and cost.

Security Architectureapplication-layer encryptiondata encryption
0 likes · 13 min read
How to Scale Data Encryption Across Millions of Services: A Practical Roadmap
Tencent Cloud Developer
Tencent Cloud Developer
Sep 13, 2022 · Databases

Implementing a Transparent Data Encryption Framework for Database Security

The article presents a transparent data‑encryption framework for database security that uses an AOP‑based driver interceptor to rewrite SQL, encrypt/decrypt sensitive fields, manage performance with locks and caching, support configurable algorithms via SPI/YAML, and guide a three‑phase migration with minimal code intrusion.

Data MigrationDatabase SecurityPerformance Optimization
0 likes · 11 min read
Implementing a Transparent Data Encryption Framework for Database Security
Selected Java Interview Questions
Selected Java Interview Questions
Jul 4, 2022 · Backend Development

Introducing MyBatis-Mate: Enterprise‑Level Features for MyBatis‑Plus

This article introduces MyBatis‑Mate, an official MyBatis‑Plus extension that provides enterprise‑grade capabilities such as dictionary binding, field encryption, data masking, dynamic table maintenance, audit logging, sharding, multi‑datasource switching, and customizable data‑scope handling, all illustrated with code examples.

MyBatisdata encryptionsensitive data
0 likes · 13 min read
Introducing MyBatis-Mate: Enterprise‑Level Features for MyBatis‑Plus
Weimob Technology Center
Weimob Technology Center
May 12, 2022 · Information Security

Securing Enterprise Data: Inside WKMS’s Scalable Key Management and Encryption Architecture

This article explains how WKMS addresses rising data‑protection regulations by offering a hierarchical key‑management service, masking SDK, AES‑based encryption, robust disaster‑recovery, and high‑throughput performance testing, illustrating a secure yet scalable solution for modern enterprises.

Cloud NativePerformance TestingSecurity Architecture
0 likes · 10 min read
Securing Enterprise Data: Inside WKMS’s Scalable Key Management and Encryption Architecture
JD Tech
JD Tech
Apr 20, 2022 · Information Security

Privacy Compliance Governance Practices in JD Finance Mobile App

This article details JD Finance's comprehensive privacy compliance governance for its mobile app, covering regulatory background, scope definition, key risk areas, policy and permission management, data encryption, sensitive API handling, third‑party SDK control, tooling such as Pandora Kit and Lancet, and the Utrust platform for automated detection and remediation.

SDKcompliancedata encryption
0 likes · 25 min read
Privacy Compliance Governance Practices in JD Finance Mobile App
Java Architect Essentials
Java Architect Essentials
Feb 15, 2022 · Databases

mybatis-mate: An Enterprise‑Level MyBatis‑Plus Extension for Sharding, Data Auditing, Encryption, and More

This article introduces mybatis-mate, an official MyBatis‑Plus extension that provides enterprise‑grade features such as sharding, multi‑datasource support, data auditing, field encryption, sensitive‑data masking, automatic DDL maintenance, dynamic datasource switching, distributed transaction logging, and fine‑grained data permission control, with detailed usage examples and configuration snippets for Spring Boot projects.

Data AuditingJavaMyBatis
0 likes · 15 min read
mybatis-mate: An Enterprise‑Level MyBatis‑Plus Extension for Sharding, Data Auditing, Encryption, and More
Programmer DD
Programmer DD
Nov 28, 2021 · Backend Development

Master MyBatis with Mybatis-Mate: Sharding, Encryption, Auditing and More

This article introduces Mybatis-Mate, an enterprise‑level MyBatis extension that provides sharding, data audit, sensitive‑word filtering, field encryption, dictionary binding, data permission, dynamic DDL generation and other features, and shows how to integrate and use them with practical code examples.

Backend DevelopmentData AuditingJava
0 likes · 14 min read
Master MyBatis with Mybatis-Mate: Sharding, Encryption, Auditing and More
Java High-Performance Architecture
Java High-Performance Architecture
Nov 15, 2021 · Backend Development

Unlock Enterprise-Level Data Management with MyBatis-Mate: Sharding, Encryption, and Dynamic DDL

mybatis-mate extends MyBatis with enterprise-grade capabilities such as sharding, multi-datasource routing, data audit, sensitive-word filtering, field encryption, dictionary binding, dynamic DDL generation, data-scope permissions, and performance logging, providing a comprehensive solution for agile and secure data handling in Java backend applications.

BackendDynamic DDLJava
0 likes · 15 min read
Unlock Enterprise-Level Data Management with MyBatis-Mate: Sharding, Encryption, and Dynamic DDL
Top Architect
Top Architect
Nov 13, 2021 · Backend Development

Introducing MyBatis-Mate: Enterprise‑Level Features for MyBatis‑Plus

This article introduces MyBatis‑Mate, an official MyBatis‑Plus extension that provides enterprise‑grade capabilities such as sharding, data auditing, field encryption, dictionary binding, sensitive data masking, automatic DDL maintenance, dynamic data‑source switching, performance logging, and fine‑grained data‑scope control, all illustrated with practical code examples.

JavaMyBatisMyBatis-Mate
0 likes · 15 min read
Introducing MyBatis-Mate: Enterprise‑Level Features for MyBatis‑Plus
Java Captain
Java Captain
Nov 6, 2021 · Databases

Introducing mybatis-mate: Enterprise‑Level MyBatis Extension for Sharding, Data Encryption, Auditing, and More

The article presents mybatis-mate, an enterprise‑grade MyBatis module that provides sharding, data auditing, sensitive‑word filtering, field encryption, dictionary write‑back, data permission, automatic DDL maintenance, dynamic multi‑datasource switching, and distributed transaction logging, offering developers a more agile and elegant way to handle data.

Data AuditingORMdata encryption
0 likes · 15 min read
Introducing mybatis-mate: Enterprise‑Level MyBatis Extension for Sharding, Data Encryption, Auditing, and More
iQIYI Technical Product Team
iQIYI Technical Product Team
Sep 10, 2021 · Information Security

Introduction and Business Practice of Cloud KMS for Data Security at iQIYI

iQIYI’s security team created a Cloud KMS platform that, in line with China’s Data Security Law, provides HSM‑backed key lifecycle management, API‑driven encryption, high‑availability deployment and fine‑grained access control, enabling its membership services to meet compliance, cut development effort by ~80 %, halve operational workload and lower costs, while laying groundwork for future features such as traffic splitting and zero‑intrusion integration.

Business PracticeCloud KMScloud computing
0 likes · 7 min read
Introduction and Business Practice of Cloud KMS for Data Security at iQIYI
Java Architecture Diary
Java Architecture Diary
Sep 2, 2021 · Backend Development

Master MyBatis‑Mate: Dictionary Binding, Encryption, Sharding & Data Scope Explained

This guide introduces MyBatis‑Mate’s core capabilities—including dictionary binding, field encryption, data masking, automatic DDL maintenance, dynamic sharding, and data‑scope permissions—while providing Maven dependencies and complete Java code examples for integrating these features into Spring Boot applications.

BackendData PermissionJava
0 likes · 8 min read
Master MyBatis‑Mate: Dictionary Binding, Encryption, Sharding & Data Scope Explained
Programmer DD
Programmer DD
Aug 24, 2021 · Databases

Seamless Data Encryption with ShardingSphere: A Spring Guide

This article explains why encrypting sensitive customer data in databases is essential, outlines common pain points, and demonstrates how Apache ShardingSphere’s data‑desensitization module can be quickly configured in Spring (XML and Boot) to provide transparent AES encryption and decryption without altering business code.

AESDatabase SecurityJava
0 likes · 8 min read
Seamless Data Encryption with ShardingSphere: A Spring Guide
Architect's Tech Stack
Architect's Tech Stack
Jul 29, 2021 · Databases

Quick Start Guide to Data Encryption (Masking) with Apache ShardingSphere in Spring and Spring Boot

This article explains how to use Apache ShardingSphere's encryption module to transparently store and query sensitive customer data such as ID numbers and bank cards by configuring encryption rules in Spring or Spring Boot, eliminating manual SQL encryption and simplifying compliance for legacy systems.

Database SecurityJavaSQL Masking
0 likes · 9 min read
Quick Start Guide to Data Encryption (Masking) with Apache ShardingSphere in Spring and Spring Boot
Programmer DD
Programmer DD
Jul 29, 2021 · Databases

Secure Sensitive Data in ShardingSphere: Quick Start Guide for Spring

This tutorial explains why encrypting sensitive fields like ID numbers and bank cards is required, outlines common pain points, and shows how to configure ShardingSphere's data‑desensitization module using Spring namespace or Spring Boot with full code examples and configuration files.

Database SecurityJavaShardingSphere
0 likes · 8 min read
Secure Sensitive Data in ShardingSphere: Quick Start Guide for Spring
Java Architecture Diary
Java Architecture Diary
Jul 28, 2021 · Backend Development

Unlock Enterprise‑Level Data Handling with MyBatis‑Mate 1.0.1: Features & Code Guide

The release of MyBatis‑Mate 1.0.1 introduces enterprise‑grade features such as dictionary binding, field encryption, data desensitization, automatic DDL maintenance, and dynamic multi‑datasource sharding, accompanied by code examples, future roadmap, and Maven dependencies for seamless integration into Spring Boot projects.

BackendDDLDictionary Binding
0 likes · 7 min read
Unlock Enterprise‑Level Data Handling with MyBatis‑Mate 1.0.1: Features & Code Guide
Alibaba Cloud Developer
Alibaba Cloud Developer
Jul 9, 2021 · Cloud Native

How Cloud‑Native Security Is Turning Into a Built‑In Immunity System

Drawing on two decades of network‑security experience, Alibaba Cloud’s security chief explains how cloud‑native approaches replace plug‑in defenses with built‑in, pre‑emptive protection, automatic remediation, zero‑trust principles, hardware‑level trust and default data encryption, creating an immune‑like system for enterprises.

Infrastructure Securitycloud securitydata encryption
0 likes · 10 min read
How Cloud‑Native Security Is Turning Into a Built‑In Immunity System
dbaplus Community
dbaplus Community
Apr 25, 2021 · Information Security

Essential MySQL Security Practices: From Storage to Data Encryption

Learn comprehensive MySQL security strategies covering storage RAID configurations, network whitelisting, OS hardening, account management, privilege restrictions, audit logging, regular backups, data encryption, and disaster recovery to protect enterprise data against breaches and ensure stable, high‑performance operations.

BackupDatabase Securityaccess control
0 likes · 13 min read
Essential MySQL Security Practices: From Storage to Data Encryption
Beike Product & Technology
Beike Product & Technology
Mar 19, 2021 · Information Security

Key Management System (KMS) Overview and Common Cryptographic Security Risks

The article outlines typical cryptographic security risks such as weak algorithms, insufficient key lengths, poor key management, and then introduces a comprehensive Key Management System (KMS) architecture, its core functions, key hierarchy, and practical application scenarios like API signing and data encryption.

API signingKMSSecurity Risks
0 likes · 9 min read
Key Management System (KMS) Overview and Common Cryptographic Security Risks
政采云技术
政采云技术
Oct 18, 2020 · Information Security

How to Secure Front‑End Data with Hybrid AES‑RSA Encryption: A Complete Guide

In the era of big data and GDPR, front‑end developers must protect personal information beyond HTTPS by using a hybrid AES‑RSA encryption scheme, and this article explains the threats, compares symmetric, asymmetric and hash algorithms, and provides full client‑side and Node.js server implementations with code examples.

AESGDPRJavaScript
0 likes · 16 min read
How to Secure Front‑End Data with Hybrid AES‑RSA Encryption: A Complete Guide
Programmer DD
Programmer DD
Apr 20, 2020 · Information Security

Essential API Security Measures and How to Implement Them

This article outlines key security mechanisms for public APIs—including data encryption, signing, timestamp validation, AppId authentication, rate limiting, blacklist handling, and data validation—and provides practical Java code examples for each technique.

API SecurityAuthenticationdata encryption
0 likes · 11 min read
Essential API Security Measures and How to Implement Them
21CTO
21CTO
Jul 6, 2019 · Information Security

How to Secure Mobile Web Campaign Pages Against Bot Attacks

This article examines the security challenges of mobile web marketing pages, explains how bot-driven API abuse harms users and businesses, and presents a comprehensive solution involving front‑end behavior tracking, risk‑control services, token‑based HTTPS communication, data encryption, and JavaScript obfuscation to protect against automated attacks.

Web Securitydata encryptionhuman verification
0 likes · 16 min read
How to Secure Mobile Web Campaign Pages Against Bot Attacks
Big Data and Microservices
Big Data and Microservices
Apr 21, 2016 · Information Security

How Can Banks Secure Big Data? Key Strategies for Protecting Customer Information

In the era of big data, banks face unprecedented information security challenges due to massive, valuable, and highly damaging data breaches, and must adopt encryption, flexible access control, rigorous auditing, DLP solutions, strict data management, and robust outsourcing controls to safeguard customer information.

BankingBig DataDLP
0 likes · 10 min read
How Can Banks Secure Big Data? Key Strategies for Protecting Customer Information