| Tags | security |
|---|---|
| Ranking | #41249 in MvnRepository (See Top Artifacts) |
| Used By | 12 artifacts |
| Version ▼ | Vulnerabilities | Repository | Usages | Date | |
|---|---|---|---|---|---|
2.7.x | 2.7.0.Final | Central | Jun 10, 2020 | ||
2.6.x | 2.6.0.Final | Central | Dec 05, 2019 | ||
2.5.x | 2.5.0.Final | Central | Jul 18, 2019 | ||
2.4.x | 2.4.0.Final | Central | Mar 17, 2019 | ||
2.3.x | 2.3.0.Final | Central | Jan 16, 2019 | ||
2.2.x | 2.2.1.Final | Central | Oct 30, 2018 | ||
| 2.2.0.Final | Central | Sep 05, 2018 | |||
2.1.x | 2.1.0.Final | Central | Aug 14, 2018 | ||
2.0.x | 2.0.0.Final | Central | Jun 22, 2018 |
Related Books
| Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025) by Snoke, Nancy | |
| Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024) by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam | |
| The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022) by Tijms, Arjan, Bais, Teo, Keil, Werner | |
| Java Security (2nd Edition) (2001) by Oaks, Scott |