Results for: swing based visual query builder java code - Page 4

Suggested Categories:

Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Data Visualization Software
Data visualization software helps organizations transform raw data into visual formats such as charts, dashboards, and interactive reports for easier interpretation. It enables users to identify trends, patterns, and insights quickly, supporting better decision-making across teams. These tools often integrate with databases, spreadsheets, and BI platforms to pull real-time or historical data for analysis. With customizable dashboards and intuitive drag-and-drop interfaces, both technical and non-technical users can explore data effectively. Businesses use data visualization software to communicate insights clearly, track KPIs, and make data-driven strategies actionable.
No-Code Development Platforms
No-code development platforms provide a way for users to design, build, and develop software applications without the need for traditional coding. They are built in such a way that users can rely on simple visual interfaces with drag and drop type tools, allowing them to rapidly develop applications with minimal technical knowledge. This makes no-code development platforms ideal for any user regardless of programming experience, from hobbyists to entrepreneurs. Furthermore, modern no-code platforms allow complex mobile apps or web projects to be created more quickly than ever before.
Java CMS Software
Java CMS software, built on Java programming language and having multiple tools and features, is used by enterprises as a content management platform.
Code Collaboration Tools
Code collaboration tools are platforms that enable developers to work together on software projects by facilitating real-time collaboration, version control, and code sharing. These tools allow multiple developers to edit and review code simultaneously, track changes, and manage different versions of code through branches and commits. Key features typically include code reviews, pull requests, conflict resolution, issue tracking, and integration with version control systems like Git. Code collaboration tools are essential for team-based development environments, ensuring smooth coordination and improving productivity in software projects.
QR Code Generators
QR code generators are tools that allow users to create quick response (QR) codes, which are machine-readable barcodes that store information such as URLs, text, contact details, or Wi-Fi credentials. These tools typically allow users to customize QR codes by changing their size, color, and design while ensuring the code remains scannable. QR code generators are commonly used for marketing, event registration, payments, product packaging, and contactless interactions. They help businesses and individuals provide an easy way for users to access digital content or services through their smartphones or other scanning devices.
Query Engines
Query engines are software tools designed to retrieve and process data from databases or large datasets in response to user queries. They efficiently interpret and execute search requests, optimizing the retrieval process to deliver accurate and relevant results quickly. Query engines can handle structured, semi-structured, and unstructured data, making them versatile for various applications such as data analytics, business intelligence, and search engines. They often support complex query languages like SQL and can integrate with multiple data sources to provide comprehensive insights. By optimizing data retrieval, query engines enhance the performance and usability of data-driven applications and decision-making processes.
Home Builder Software
Home builder software facilitates the monitoring of home-building projects, their progress, scheduling and costs, while providing customer management tools.
Visual Configuration Software
Visual configuration software allows users to create and customize products by visually selecting options and features, making it ideal for industries like manufacturing, retail, and custom products. These platforms provide an interactive interface where customers or users can configure products by choosing colors, sizes, materials, and other specifications, all in real time. The software typically includes 3D models or visual representations of the product to give users an accurate view of their customizations. Visual configuration software often integrates with e-commerce platforms, product management systems, and order fulfillment processes, ensuring a seamless experience from design to delivery.
Website Builder Software
Website builders are tools that allow users to create websites without coding. These platforms provide a range of features and tools, such as drag-and-drop design elements, hosting, and domain registration. Website builders have become popular due to their ease-of-use and cost savings compared to hiring a professional web developer or designer. They are also typically well supported with step-by-step tutorials and customer service options for those who need help getting started.
Visual Project Management Software
Visual project management software enables teams and project managers to visually plan and track progress of projects.
Code Editors
Code editors are software tools that allow developers to write, edit, and debug source code for programming and web development. These editors provide essential features like syntax highlighting, code completion, auto-indentation, and error detection to enhance productivity and reduce coding errors. Many code editors also offer integrations with version control systems (like Git), debuggers, and build tools, allowing developers to manage their code and workflows efficiently. While some code editors are lightweight and focused solely on text editing, others offer extensive features and customization options through plugins and extensions. By providing a streamlined environment for coding, code editors are essential for software development, web development, and scripting tasks.
Infrastructure as Code Software
Infrastructure as Code (IaC) tools are software solutions that enable developers and IT teams to automate the provisioning, configuration, and management of infrastructure using code. These tools allow users to define and manage infrastructure components like servers, databases, and networking resources through configuration files, ensuring consistency and repeatability in infrastructure setups. IaC tools typically support version control, enabling teams to track changes and collaborate on infrastructure management.
Code Search Engines
Code search engines are specialized search tools that allow developers to search through codebases, repositories, or libraries to find specific functions, variables, classes, or code snippets. These tools are designed to help developers quickly locate relevant parts of code, analyze code quality, and identify reusable components. Code search engines often support various programming languages, providing search capabilities like syntax highlighting, filtering by file types or attributes, and even advanced search options using regular expressions. They are particularly useful for navigating large codebases, enhancing code reuse, and improving overall productivity in software development projects.
Code Enforcement Software
Code enforcement software is software that helps local government agencies and municipalities manage and enforce building codes, zoning laws, and other regulatory compliance requirements. These platforms typically provide features for tracking violations, issuing citations, managing inspections, and automating the code enforcement process. Code enforcement software can also include tools for scheduling inspections, documenting findings, generating reports, and managing case histories. It helps ensure that properties comply with local laws and ordinances, improving efficiency and accountability in enforcement processes. Additionally, it allows for better communication between enforcement officers, residents, and other stakeholders.
Online Form Builders
Online form builders enable the creation of fillable forms through a drag-and-drop interface in order to be embedded or shared on web pages.
JavaScript Libraries
JavaScript libraries are collections of pre-written JavaScript code that developers can use to simplify and accelerate web development tasks. They provide ready-made functions, utilities, and components for handling common challenges such as DOM manipulation, animations, event handling, data formatting, and AJAX requests. By using libraries, developers reduce the amount of repetitive coding needed and ensure greater cross-browser compatibility. Many JavaScript libraries focus on specific areas, such as UI design, data visualization, or state management, making them versatile tools in both front-end and back-end development. They play a vital role in modern web applications by boosting efficiency, improving code quality, and supporting rapid prototyping.
JavaScript Obfuscators Software
JavaScript obfuscators are tools that transform human-readable JavaScript code into a form that is difficult to understand, reverse-engineer, or tamper with. They typically replace variable names, functions, and control structures with complex or meaningless patterns while preserving the code’s original functionality. Some obfuscators also add layers of protection like string encryption, dead code insertion, and control flow flattening to further complicate analysis.
Coding Challenge Platforms
Coding challenge platforms, also known as code assessment and technical skills testing platforms, enable developers and organizations to test their coding skills to see what skills need to be improved, or to determine the coding skills of a potential hire. Many coding challenge platforms also offer features like coding competitions, mock interviews, and collaboration opportunities for learning with others. These platforms are popular among job seekers, developers, and coding enthusiasts looking to enhance their problem-solving abilities.
Revenue-Based Financing Companies
Revenue-based financing companies, also known as royalty-based financing companies, are companies that provide financing to businesses with predictable revenue streams. Revenue-based financing firms provide upfront capital in exchange for a percentage of top line revenue, or a fixed percentage of each contract. Revenue-based financing solutions are ideal for companies with predictable, recurring revenue such as SaaS companies, ecommerce retailers, subscription businesses, and more.
View more categories (20) for "swing based visual query builder java code"

448 Products for "swing based visual query builder java code" with 3 filters applied:

  • 1
    Tesseral

    Tesseral

    Tesseral

    Tesseral is the open source platform for managing identity and access in business software. It provides enterprise-grade capabilities, including SAML single sign-on, SCIM provisioning, role-based access control, managed API keys, and audit logs, implemented in just a few lines of code. Tesseral unifies access management for employees, customers, services, and AI agents, giving organizations the flexibility to adapt to any deployment model and the authority to enforce security policies with precision. You can learn more by reading our docs or by checking out our GitHub.
    Starting Price: $0
  • 2
    cside

    cside

    cside

    cside is the leading client-side intelligence platform. Protecting organizations from advanced client-side threats such as script injection, data skimming, and browser-based attacks, risks often overlooked by traditional security measures. Leveraging client-side intelligence to provide evidence to fight chargeback fraud cases. It also addresses the growing challenge of web supply chain risk, ensuring real-time visibility and control over third-party scripts running in user environments. cside provides proactive, proxy-based protection that helps organizations meet compliance requirements like PCI DSS 4.0.1, safeguard sensitive data, and uphold user privacy, all without compromising performance.
    Leader badge
    Starting Price: $99 per month
    Partner badge
    View Software
    Visit Website
  • 3
    VenariX

    VenariX

    VenariX

    ...Customize and export your cyber insights dashboard for a tailored view of charts, graphs, and key stats, enhancing decision-making and reporting. Sort and analyze an exhaustive inventory of cyber incidents with detailed, time-based filters across various categories, enabling proactive measures and strategic planning. Track threat actors’ behaviors and patterns, equipping your team with the knowledge to anticipate and mitigate cyber risks. Visualize global incidents' origins and impacts, facilitating a better understanding of the cyber threat landscape and enhancing your global cyber defense strategies. ...
    Starting Price: $252 per year
  • 4
    GoAccess

    GoAccess

    GoAccess

    ...The tool supports various web log formats, including those from Apache, Nginx, Amazon S3, Elastic Load Balancing, CloudFront, and Caddy, allowing users to set the log format and analyze logs effortlessly. Written in C, GoAccess requires only ncurses as a dependency, ensuring swift, millisecond-level updates. It offers customizable terminal and web-based dashboards, enabling users to tailor color schemes to their preferences. Beyond terminal output, GoAccess can generate comprehensive, self-contained real-time HTML reports, as well as JSON, facilitating analytics, monitoring, and data visualization.
    Starting Price: Free
  • 5
    Apozy Airlock
    ...It doesn’t have to be. Airlock fills the gap in your EPP/EDR by protecting the browser, delivering a safe, clean, and lightning-fast internet experience. Powered by the very first visually-aware native browser isolation platform with over 6 petabytes of visual data, Airlock prevents web attacks in real time. Airlock stops spearfishing in its tracks. With a visual model database of over 67.83 billion pages which analyzes over 12.20 trillion links per year, our technology protects anyone clicking on a malicious link by sandboxing the threat.
    Starting Price: $9/month/user
  • 6
    Arnica

    Arnica

    Arnica

    Put your software supply chain security on autopilot. Actively mitigate anomalies & risks in your development ecosystem, protect developers, and trust their code commits. Automate developer access management. Behavior-based developer access management with self-service provisioning in Slack or Teams. Continuously monitor and mitigate anomalous developer behavior. Identify hardcoded secrets. Validate and mitigate before they land in production. Go beyond SBOM and get visibility into all open-source licenses, infrastructure, vulnerabilities, and OpenSSF scorecards across your organization in minutes. ...
    Starting Price: Free
  • 7
    Vault Vision

    Vault Vision

    Vault Vision

    Vault Vision is the leading user authentication platform for modern web and mobile apps, built with privacy-first security and passwordless login convenience for end users. Vault Vision's low code platform enables applications to completely secure user logins on React, Python, Go, Node, Webflow and more. Vault Vision protects end user privacy from password breaches by eliminating use of third-party scripts, sdk's and trackers. Our platform helps application owners increase user login engagement with passwordless application logins powered by mobile passkeys, two factor auth (2FA), multi-factor auth (MFA), face id auth, fingerprint auth, USB key auth, pin based auth, SSO with email, OIDC logins for Apple, Google and Microsoft, and more.
    Starting Price: $25/month for 10k users
  • 8
    GreyNoise

    GreyNoise

    GreyNoise

    ...GreyNoise notifies analysts when an IP they care about shows up in our collection, helping security teams respond quickly to compromises. Security teams can uncover tradecraft seen across the internet through our GreyNoise Query Language (GNQL). Our tags reveal IPs looking for and exploiting vulnerabilities. Security teams can assess their exposure as they monitor progressive threat activity.
  • 9
    VictoriaLogs

    VictoriaLogs

    VictoriaMetrics

    VictoriaLogs, an open-source log database from VictoriaMetrics, is designed to be user-friendly. It seamlessly integrates with widely used log collectors and offers a more straightforward setup process than Elasticsearch and Grafana Loki. The robust LogsQL query language provides full-text search capabilities across all log fields, simplifying log management. It scales impressively with CPU, RAM, disk IO, and space, running efficiently on Raspberry Pi and high-end servers. It handles data volumes up to 30 times larger than Elasticsearch and Grafana Loki on the same hardware, making it a powerful choice for various environments. ...
    Starting Price: $0
  • 10
    Rethink DNS

    Rethink DNS

    Rethink DNS

    ...It combines a DNS resolver, firewall, and VPN client into a single tool, allowing users to block ads, trackers, malware, and spyware across all apps. The app supports over 190 blocklists, including those used by popular ad blockers like uBlock Origin. By encrypting DNS queries using DNS over HTTPS (DoH) or DNS over TLS (DoT), RethinkDNS ensures secure and private internet connections. Additionally, it offers a customizable firewall to control internet access on a per-app basis and includes a built-in WireGuard VPN client for encrypting outgoing connections. RethinkDNS is available for download on the Google Play Store and F-Droid. ...
    Starting Price: Free
  • 11
    ManageEngine Applications Manager
    ManageEngine Applications Manager is an enterprise-ready platform designed to monitor an entire application ecosystem of a business organization. Our platform helps IT and DevOps teams get visibility into all the dependent components within their application stack. With Applications Manager, it becomes easier to monitor the performance of mission-critical web applications, web servers, databases, cloud services, middleware, ERP systems, messaging components, and more. It has tons of...
    Leader badge
    Starting Price: $395.00/Year
  • 12
    Dynamic

    Dynamic

    Dynamic

    Once you configure Dynamic, you can add and remove chains, enable information collection, structure gates and access lists, and much much more, all without touching code. Dynamic supports EVM chains, Solana and Flow, with many more coming soon. It's as easy as toggling them on. Dynamic's SDK is fully customizable, meaning you can control colors, corners, experience and much more. Automatically block risky wallets by screening all wallets against Chainalysis’ US OFAC sanctions list. For holistic protection, you can easily upgrade to a full suite of integrated monitoring and compliance tools from Chainalysis. ...
  • 13
    Brakeman

    Brakeman

    Brakeman

    Brakeman is a security scanner for Ruby on Rails applications. Unlike many web security scanners, Brakeman looks at the source code of your application. This means you do not need to set up your whole application stack to use it. Once Brakeman scans the application code, it produces a report of all security issues it has found. Brakeman requires zero setup or configuration once it is installed. Just run it. Because all Brakeman needs is source code, Brakeman can be run at any stage of development: you can generate a new application with rails new and immediately check it with Brakeman. ...
  • 14
    SecretHub

    SecretHub

    SecretHub

    ...It's impossible to track who accessed what secrets at what time, making compliance audits a nightmare. Eliminate secrets in source code by replacing plaintext values with a reference to the secret. SecretHub then automatically loads secrets into your app the moment it starts. Use the CLI to encrypt and store secrets and then simply tell the code where to look for the secret. Your code is now free of secrets and can be shared with everyone on your team.
    Starting Price: $99 per month
  • 15
    PHP Secure

    PHP Secure

    PHP Secure

    PHP Secure is a FREE code scanner that analyzes your PHP code for critical security vulnerabilities. Free online scanner: - Quickly and qualitatively finds web app vulnerabilities - Gives explicit reports and recommendations to fix vulnerabilities - Easy to use and requires no specialized knowledge - Reduces risk, saves budget, and boosts productivity PHP Secure Scanner is suitable for analyzing sites on Php, framework Laravel, and CMS Wordpress, Drupal and Joomla. ...
  • 16
    OX Security

    OX Security

    OX Security

    Automatically block risks introduced into the pipeline and ensure the integrity of each workload, all from a single location. Full visibility and end to end traceability over your software pipeline security from cloud to code. Manage your findings, orchestrate DevSecOps activities, prevent risks and maintain software pipeline integrity from a single location. Remediate risks based on prioritization and business context. Automatically block vulnerabilities introduced into your pipeline. Immediately identify the “right person” to take action on any security exposure. ...
    Starting Price: $25 per month
  • 17
    AutoSPF

    AutoSPF

    AutoSPF

    ...With AutoSPF you just add a single include in your SPF record that points to our server and we take care of the rest. AutoSPF always returns a flattened SPF record to public DNS queries. It's built on the real-time information held in the include statement. AutoSPF does all those things you'd expect from an SPF flattening service. Automatic flattening of all the domains in the include. With AutoSPF you won't need to constantly modify your DNS records in order to update SPF. You can add new networks or authenticate new senders at the click of a button. ...
    Starting Price: $27 Fee
  • 18
    DeCloudUs

    DeCloudUs

    DeCloudUs

    ...It offers users the ability to create multiple custom DNS profiles, allowing for tailored filtering rules and parental controls. The service supports encrypted DNS protocols, including DNSCrypt, DNS over TLS (DoT), and DNS over HTTPS (DoH), ensuring secure and private DNS queries. DeCloudUs operates on self-hosted infrastructure without reliance on third-party cloud services, adhering to a strict zero-logs policy to maintain user privacy. Subscription plans provide access to various DNS servers with different filtering capabilities, catering to diverse user needs. With DeCloudUs, you get access to multiple DNS servers that offer different types and levels of filtering capabilities to suit any use case you have for all of your devices or even the entire home network.
    Starting Price: $0.49 per month
  • 19
    ImunifyAV

    ImunifyAV

    Imunify360

    From malicious code such as PHP (WordPress, Joomla or Drupal), or built with classic, static HTML, keeping malicious code out of your files is essential for the protection of your websites. ImunifyAV, the free malware scanner, thoroughly sweeps files and accurately identifies malicious code, notifying you of any issues on your websites. A standard antivirus program that performs regular file checks in the background to keep your server clean.
    Starting Price: $12 per server per month
  • 20
    Phoenix Security

    Phoenix Security

    Phoenix Security

    Phoenix Security enables security, developers, and businesses to all talk the same language. We help security professionals focus on the vulnerabilities that matter most across cloud, infrastructure, and application security. Laser focuses on the 10% of vulnerabilities that matter today, and reduces risk faster with prioritized contextualized vulnerabilities. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Threat intelligence automatically in the...
    Starting Price: $3,782.98 per month
  • 21
    Orna

    Orna

    Orna

    ...Orna detects attacks and anomalies across the entire infrastructure 24/7/365, groups them by source, incident relevance, and criticality, and enriches them with threat intelligence data from 28 public and private sources. ORNA's AI analyzes the threat and estimates the severity of the resulting incident, not just the alert, as well as the affected assets. Clear, color-coded dashboards provide attack breakdown by asset, type, technique, time, and more to speed up operations. ORNA's SMS and email notifications are secure and highly configurable based on the team member's role, source, and severity to avoid alert fatigue. When an attack happens, quick and decisive actions make all the difference. With ORNA, you can mount a world-class response, as all alerts can be escalated into incidents with a single action.
    Starting Price: $833 per month
  • 22
    Tosi

    Tosi

    Tosi

    ...Deployment is rapid, sites can be up and running in under five minutes with a “plug-and-go” setup, allowing organizations to connect distributed infrastructure quickly and securely without specialized IT expertise. It implements a zero-trust security model with enterprise-grade protections: end-to-end 256-bit AES encryption, hardware-based authentication (with RSA keys), no open inbound ports, and ISO/IEC 27001:2022 certification. With Tosi, you get unified, centralized management through a single interface (TosiControl), enabling visual network topology views.
    Starting Price: Free
  • 23
    GitGuardian

    GitGuardian

    GitGuardian

    GitGuardian is an end-to-end NHI security platform that empowers software-driven organizations to enhance their Non-Human Identity (NHI) security and comply with industry standards. With attackers increasingly targeting NHIs, such as service accounts and applications, GitGuardian integrates Secrets Security and NHI Governance. This dual approach enables the detection of compromised secrets across your dev environments while also managing non human identities and their secrets...
    Leader badge
    Starting Price: $0
  • 24
    DNS Check

    DNS Check

    Wind Serve

    ...The DNS Checker. At the heart of DNS Check is a DNS record checking tool, which compares the DNS records that you enter to what DNS servers are returning in response to queries. If there's an issue, the record checking tool enables you to identify it quickly. Detectable issues include: Unresponsive name server. The wrong IP address returned.
    Starting Price: $8 per user per month
  • 25
    Tigera

    Tigera

    Tigera

    Kubernetes-native security and observability. Security and observability as code for cloud-native applications. Cloud-native security as code for hosts, VMs, containers, Kubernetes components, workloads, and services to secure north-south and east-west traffic, enable enterprise security controls, and ensure continuous compliance. Kubernetes-native observability as code to collect real-time telemetry, enriched with Kubernetes context, for a live topographical view of interactions between components from hosts to services. ...
  • 26
    Google Authenticator
    Google Authenticator generates 2-Step Verification codes on your phone. 2-Step Verification provides stronger security for your Google Account by requiring a second step of verification when you sign in. In addition to your password, you’ll also need a code generated by the Google Authenticator app on your phone. You can use your Google Account to more easily and securely sign in to thousands of sites and services on the web, while keeping your privacy choices transparent in one place. ...
  • 27
    Omega DB Security Reporter
    ...Omega DB Security Reporter enables assessment, reporting, visualization and documentation of the security posture of your Oracle database on the following security areas of top importance: Privileges: for system, objects, and roles Audits: on system privileges, user statements, audited system actions, object privileges and operations audits Others: User password profile resources Initialization (security) parameters
    Starting Price: $899 USD
  • 28
    V-OS Mobile App Protection
    V-OS Mobile App Protection solution can detect and protect the mobile app from threats, such as reverse-engineering, hooking, tampering, app integrity checks, library signature validation, code injection, debugging, and many more. In an insecure OS environment when the phone is compromised, apps integrated with V-OS Mobile Application Protection have rooted and jailbreak detection mechanisms that allow a mobile app to run smoothly without compromising its integrity and confidentiality, without breaking its security or leaking any sensitive information stored inside the app. ...
  • 29
    threatYeti by alphaMountain
    threatYeti by alphaMountain, turns security professionals and hobbyists alike into a senior IP threat intelligence analysts with a browser-based platform that renders real-time threat verdicts for any domain, URL, or IP on the internet. With threatYeti, the risk posed by a domain is rendered instantly with a color-coded rating from 1.00 (low risk) to 10.00 (high risk). threatYeti also protects cyber threat analysts and their networks from risky sites. threatYeti’s no-click categorization presents sites into at least one out of 89 categories so that analysts don’t have to visit them and risk encountering objectionable material or downloading malware. threatYeti also displays related hosts, threat factors, passive DNS, certificates, redirect chains and more, giving analysts the full picture of any host. ...
    Starting Price: $0
  • 30
    KeePassium

    KeePassium

    KeePassium

    KeePassium is a privacy-first password manager for iOS and macOS that combines the trusted open source format of KeePass with a clean, intuitive design and full user control over where databases are stored. It supports offline or cloud-based database files, automatic two-way sync with any storage provider accessible via the Files app, and AutoFill for websites and apps. KeePassium supports all major KeePass database formats (kdb, kdbx3, kdbx4) and uses strong, time-proven encryption algorithms such as AES, ChaCha20, Twofish, and Argon2. It includes features like custom entry fields, custom icons, TOTP codes, file attachments, Face ID/Touch ID or passcode unlock, full accessibility support (VoiceOver, large text), entry history, recycle bin for deleted entries, and pre-saving of database copies for safety. ...
    Starting Price: €19.99 per year