Featured | Featured article

How to Manage User Sessions in PHP Securely

Despite all the advantages that sessions offer, the disadvantages should not be completely ignored.

Rheinwerk Computing
Rheinwerk Computing

Rheinwerk Computing is an imprint of Rheinwerk Publishing and publishes books by leading experts in the fields of programming, administration, security, analytics, and more.

Blogs by Rheinwerk Computing

Web Development

What Is a Rapid User Test in Software Development?

Curious how to get user feedback faster than ever? Discover the ins and outs of rapid user testing—an efficient, cost-effective way to refine your...

Java

Design Patterns in Java

Master the art of clean, scalable object-oriented programming in Java with design patterns like Singleton, Factory, and Observer—your ultimate guide...

Security

What Are Red Teaming and Purple Teaming in Cybersecurity?

Discover how red teaming and purple teaming can strengthen your cybersecurity defenses by simulating real-world attacks and fostering collaboration...

DevOps

Why Should You Use Kubernetes?

Understanding why your company should adopt Kubernetes begins with identifying how it can optimize value creation and align with your business goals.

Programming Languages

When Is Cleanup Not Necessary in C++ Programs?

Sometimes, skipping memory cleanup at program termination can save valuable time—especially when working with large data structures—while letting the...

JavaScript

How to Master Time in JavaScript: Essential Tips for Using the Date Object and Custom Extensions

Master the art of handling time in JavaScript with this guide to creating, formatting, and calculating time data using the powerful Date object and...

Python

An Intro to Parameters of Functions and Methods in Python

In this post, master the essentials of Python functions and methods, from defining parameters and arguments to leveraging optional and keyword-only...

Programming

Choosing the Right IDE: What Are the Java Development Environments?

From IntelliJ IDEA to Eclipse and beyond, discover how modern IDEs simplify Java development for beginners and experienced developers alike, offering...

Featured

Securing SSH Access with YubiKey: A Step-by-Step Guide to Two-Factor Authentication

Learn about enhancing your SSH login security with YubiKey, a robust two-factor authentication method using a USB security token for one-time...

Programming Languages

How to Synchronize Scripting Directories to External Storage

You probably use the cloud as a backup storage in some way or other, right?