- Präsentationen
- Dokumente
- Infografiken
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (RSA Conference 2016)
Sounil Yu
•
Vor 8 Jahren
AppSec Pipelines and Event based Security
Matt Tesauro
•
Vor 7 Jahren
Designing APIs and Microservices Using Domain-Driven Design
LaunchAny
•
Vor 7 Jahren
Choosing Your Log Management Approach: Buy, Build or Outsource
Anton Chuvakin
•
Vor 16 Jahren
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
•
Vor 12 Jahren
So You Got That SIEM. NOW What Do You Do? by Dr. Anton Chuvakin
Anton Chuvakin
•
Vor 13 Jahren
Pivotal HD as a Cloud Foundry Service
Platform CF
•
Vor 10 Jahren
Best Practices of HA and Replication of PostgreSQL in Virtualized Environments
Jignesh Shah
•
Vor 11 Jahren
Continuous Quality: What DevOps Means for QA
Jeff Sussna
•
Vor 10 Jahren
Rishidot research briefing notes Cloudscaling
Rishidot Research
•
Vor 11 Jahren
Dystopia as a Service
Adrian Cockcroft
•
Vor 11 Jahren
Gluecon 2013 - Netflix Cloud Native Tutorial Details (part 2)
Adrian Cockcroft
•
Vor 10 Jahren
Gluecon 2013 - NetflixOSS Cloud Native Tutorial Introduction
Adrian Cockcroft
•
Vor 10 Jahren
Gluecon keynote
Adrian Cockcroft
•
Vor 10 Jahren
Webinar: MongoDB 2.4 Feature Demo and Q&A on Hash-based Sharding
MongoDB
•
Vor 11 Jahren
Implementation Patterns For Software Security Programs
Denim Group
•
Vor 11 Jahren
Developing Secure Mobile Applications
Denim Group
•
Vor 11 Jahren
B-Sides Seattle 2012 Offensive Defense
Stephan Chenette
•
Vor 11 Jahren
Put a Button on It: Removing Barriers to Going Fast
OSCON Byrum
•
Vor 12 Jahren
CPN208 Failures at Scale & How to Ride Through Them - AWS re: Invent 2012
Amazon Web Services
•
Vor 11 Jahren