Subscribe to:
Post Comments (Atom)
Security Certificates
1. Cryptography Basics Understand Key Concepts : Encryption, decryption, hashing, and digital signatures. Key terms: confidentiality, inte...
-
Micro Service 12 Factor The Twelve-Factor App is a methodology for building software-as-a-service apps Codebase : One codebase tracked in v...
-
Key words Knowledge Factor Possession Factor Inherence Factor All individual factors are not secure, because if any factor comprimise. So,...
-
What is IAM rules. Lambda Pros / Cons [ColdStart Latency]. How many ways we can invoke a lambda SQS VS SNS S3 usage and different types of...
No comments:
Post a Comment