| License | Apache 2.0 |
|---|---|
| Tags | security |
| Ranking | #368095 in MvnRepository (See Top Artifacts) |
| Used By | 1 artifacts |
| Version ▼ | Vulnerabilities | Repository | Usages | Date | |
|---|---|---|---|---|---|
2.2.x | 2.2.7 | Central | Jan 07, 2025 | ||
| 2.2.6 | Central | Nov 27, 2024 | |||
| 2.2.5 | Central | Oct 04, 2024 | |||
| 2.2.4 | Central | Sep 24, 2024 | |||
| 2.2.3 | Central | Sep 06, 2024 | |||
| 2.2.2 | Central | Sep 03, 2024 | |||
2.1.x | 2.1.25 | Central | Sep 24, 2024 | ||
| 2.1.24 | Central | Jul 30, 2024 | |||
| 2.1.23 | Central | Jun 12, 2024 | |||
| 2.1.22 | Central | Mar 13, 2024 | |||
| 2.1.21 | Central | Feb 29, 2024 | |||
| 2.1.20 | Central | Feb 21, 2024 | |||
| 2.1.19 | Central | Feb 01, 2024 | |||
| 2.1.18 | Central | Jan 02, 2024 | |||
| 2.1.17 | Central | Dec 19, 2023 | |||
| 2.1.16 | Central | Dec 12, 2023 | |||
| 2.1.15 | Central | Dec 11, 2023 | |||
| 2.1.14 | Central | Dec 11, 2023 | |||
| 2.1.13 | Central | Dec 08, 2023 | |||
| 2.1.12 | Central | Oct 27, 2023 |
Related Books
| Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025) by Snoke, Nancy | |
| Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024) by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam | |
| The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022) by Tijms, Arjan, Bais, Teo, Keil, Werner | |
| Java Security (2nd Edition) (2001) by Oaks, Scott |