BOOKS - PROGRAMMING - Microservices Security in Action (MEAP)
Microservices Security in Action (MEAP) - Prabath Siriwardena and Nuwan Dias 2020 PDF Manning Publications BOOKS PROGRAMMING
ECO~23 kg CO²

2 TON

Views
51956

Telegram
 
Microservices Security in Action (MEAP)
Author: Prabath Siriwardena and Nuwan Dias
Year: 2020
Pages: 616
Format: PDF
File size: 10.9 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Kubernetes Native Microservices with Quarkus and MicroProfile
Introducing Istio Service Mesh for Microservices
Microservices in .NET Core with examples in Nancy
Playing with Java Microservices on Kubernetes and OpenShift
Kubernetes Native Microservices with Quarkus and MicroProfile
Challenges in the IoT and Smart Environments: A Practitioners| Guide to Security, Ethics and Criminal Threats (Advanced Sciences and Technologies for Security Applications)
Core Software Security Security at the Source
Lead Security (Rogue Security and Investigation, #3)
Essentials of Microservices Architecture Paradigms, Applications, and Techniques
Domain-Driven Design And Microservices Explained with Examples
Building Event-Driven Microservices (Early Release)
Building Microservices, 2nd Edition (Early Release)
Building Microservices, 2nd Edition (Early Release)
RESTful Web Microservices Cookbook (Early Release)
Ambush: Entertaining, Modern Sheriff COUNTRY CRIME THRILLER with Clean Language and Fast-Paced Action (The BIG SKY Series Action Thriller Books - Short Reads Fiction Book 2)
Reckoning: Entertaining, Modern Sheriff COUNTRY CRIME THRILLER with Clean Language and Fast-Paced Action (The BIG SKY Series Action Thriller Books - Short Reads Fiction Book 3)
Hard-Earned Lessons from Counselling in Action (Counselling in Action series)
Strategic Monoliths and Microservices. Driving Innovation Using Purposeful Architecture
Start Building RESTful Microservices using Akka HTTP with Scala
Symbolic Articulation: Image, Word, and Body between Action and Schema (Image Word Action Bild Wort Aktion Imago Sermo Actio, 4)
Go by Example (MEAP v7)
Go by Example (MEAP v7)
IRAQ-NIDS - a DARPA file action adventure: A military science fiction action adventure (The DARPA Files Book 1)
Bootstrapping Microservices, Second Edition: With Docker, Kubernetes, GitHub Actions, and Terraform
Production-Ready Microservices Building Standardized Systems Across an Engineering Organization
Helidon Revealed A Practical Guide to Oracle|s Microservices Framework
Let the Hunt Begin: Addictive, Clean Language CRIME THRILLER FICTION with Fast-Paced Suspense, Action, and Adventure (Jessica Devlin Action Crime Thriller Books - Book 3)
Intelligence and Information Policy for National Security: Key Terms and Concepts (Security and Professional Intelligence Education Series)
Handbook of Research on Intelligent Data Processing and Information Security Systems (Advances in Information Security, Privacy, and Ethics)
Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less
Community Resilience When Disaster Strikes: Security and Community Health in UK Flood Zones (Advanced Sciences and Technologies for Security Applications)
Ansible For Security by Examples: 100+ Automation Examples to Automate Security and Verify Compliance for IT Modern Infrastructure
The Security Risk Assessment Handbook A Complete Guide for Performing Security Risk Assessments, 3rd Edition
Information Security Management Systems A Novel Framework and Software as a Tool for Compliance with Information Security Standard
Machine Learning for Computer and Cyber Security Principle, Algorithms, and Practices (Cyber Ecosystem and Security)
Cyber Security Comprehensive Beginners Guide to Learn the Basics and Effective Methods of Cyber Security
Cyber Security Ultimate Beginners Guide to Learn the Basics and Effective Methods of Cyber Security
Cyber Space and Outer Space Security (River Publishers Series in Digital Security and Forensics)
Cyber Security The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
Cyber Security and Network Security