BOOKS - PROGRAMMING - Security and Microservice Architecture on AWS
Security and Microservice Architecture on AWS - Gaurav Raje 2021 PDF | EPUB O’Reilly Media, Inc BOOKS PROGRAMMING
ECO~15 kg CO²

1 TON

Views
98254

Telegram
 
Security and Microservice Architecture on AWS
Author: Gaurav Raje
Year: 2021
Pages: 397
Format: PDF | EPUB
File size: 23,2 MB, 15,5 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Freedom from Fear, Freedom from Want: An Introduction to Human Security
Wireshark for Security Professionals Using Wireshark and the Metasploit Framework
ZERO TRUST SECURITY DEMYSTIFIED: Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
Ultimate Microservices with RabbitMQ: Master Microservices Architecture and RabbitMQ Integration to Build Scalable, Resilient Systems, and to Drive Innovation … in Software Development (English
Designing Microservices Using Django Structuring, Deploying and Managing the Microservices Architecture with Django
The Cloud Data Lake: A Guide to Building Robust Cloud Data Architecture
Learning Kali Linux Security Testing, Penetration Testing & Ethical Hacking, Second Edition (4th Early Release)
Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, Third Edition
Learning Kali Linux Security Testing, Penetration Testing & Ethical Hacking, 2nd Edition (Early Release)
Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap (English Edition)
Social Security Programs and Retirement around the World: Reforms and Retirement Incentives (National Bureau of Economic Research Conference Report)
Tactical Home Defense and Security: Defend Yourself and Family Against Home Invasion and Deadly Attack (Special Tactics Manuals Book 8)
Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
Social Security 101: From Medicare to Spousal Benefits, an Essential Primer on Government Retirement Aid (Adams 101 Series)
Computer Hacking Beginners Guide: How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
Learning Kali Linux Security Testing, Penetration Testing & Ethical Hacking, Second Edition (4th Early Release)
Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, Third Edition
Ultimate Snowflake Architecture for Cloud Data Warehousing: Architect, Manage, Secure, and Optimize Your Data Infrastructure Using Snowflake for Actionable … and Informed Decisions (English Edit
Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices
Education Leadership, Management and Governance in South Africa (African Political, Economic, and Security Issues: Education in a Competitive and Globalizing World)
Escort Detail Mobile VIP Protection: Mobile Security and Motorcade Operations for 3-4 Person Details (Special Tactics Manuals Book 4)
Trade Policy and Food Security: Improving Access to Food in Developing Countries in the Wake of High World Prices (Directions in Development)
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks An Ultimate Guide To Secure Your Cloud And On-Premise Networks
Overseas Energy Investment of Korea and Japan: How did Two East Asian Resources-Rare Industrial Giants Respond to Energy Security Challenges
Tor and the Dark Art of Anonymity (deep web, kali linux, hacking, bitcoins) FREE: Network Security for the Rest of Us (FREE)
and quot;Rich Nation, Strong Army and quot;: National Security and the Technological Transformation of Japan (Cornell Studies in Political Economy)
Water, Environmental Security and Sustainable Rural Development: Conflict and Cooperation in Central Eurasia (Routledge ISS Studies in Rural Livelihoods)
Computer Networking Security Beginners Guide The Guide to CyberSecurity to Learn through a Top-Down Approach all the Defensive Actions to be taken to Protect yourself from the Dangers of the Network
Daddy|s Bodyguard: An Age-Gap Protector Ex-Military Romance: Protective Alpha Hero, Forced Proximity, Security Protection (Forbidden and Off-Limit Women Book 3)
Town House: Architecture and Material Life in the Early American City, 1780-1830 (Published by the Omohundro Institute of Early American History and Culture and the University of North Carolina Press)
Cyber Space and Outer Space Security
Secret Hideout (Cooper, #9; Cooper Security, #2)
Water Safety and Water Infrastructure Security
Secret Keeper (Cooper, #12; Cooper Security, #5)
Cyber Space and Outer Space Security
The Architecture Book Big Ideas Simply Explained (Big Ideas)
Agile Software Architecture Aligning Agile Processes and Software Architectures
Cryptography, Codes and Cyber Security: First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, Proceedings (Communications in Computer and Information Science)
China|s Naval Operations in the South China Sea: Evaluating Legal, Strategic and Military Factors (Politics, Security and Society in Asia Pacific)
Canadian State Trials, Volume IV: Security, Dissent, and the Limits of Toleration in War and Peace, 1914-1939 (Osgoode Society for Canadian Legal History)