390 Folgen

  1. CON312: Deploying Scalable SAP Hybris Clusters using Docker

    Vom: 25.12.2016
  2. SAC314: GxP Compliance in the Cloud

    Vom: 25.12.2016
  3. SAC315: Scaling Security Operations and Automating Governance: Which AWS Services Should I Use?

    Vom: 25.12.2016
  4. SAC316: Security Automation: Spend Less Time Securing Your Applications

    Vom: 25.12.2016
  5. SAC317: IAM Best Practices to Live By

    Vom: 25.12.2016
  6. SAC318: Life Without SSH: Immutable Infrastructure in Production

    Vom: 25.12.2016
  7. SAC319: Architecting Security and Governance Across a Multi-Account Strategy

    Vom: 25.12.2016
  8. SAC320: Deep Dive: Implementing Security and Governance Across a Multi-Account Strategy

    Vom: 25.12.2016
  9. SAC321: Cyber Resiliency – surviving the breach

    Vom: 25.12.2016
  10. SAC322: NEW LAUNCH! AWS Shield—A Managed DDoS Protection Service

    Vom: 25.12.2016
  11. SAC323: NEW SERVICE: Centrally Manage Multiple AWS Accounts with AWS Organizations

    Vom: 25.12.2016
  12. SAC326: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation

    Vom: 25.12.2016
  13. SAC327: No More Ransomware: How Europol, the Dutch Police, and AWS Are Helping Millions Deal with Cybercrime

    Vom: 25.12.2016
  14. SAC401: 5 Security Automation Improvements You Can Make by Using Amazon CloudWatch Events and AWS Config Rules

    Vom: 25.12.2016
  15. SAC402: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security

    Vom: 25.12.2016
  16. SEC301: Audit Your AWS Account Against Industry Best Practices: The CIS AWS Benchmarks

    Vom: 25.12.2016
  17. SEC303: Get the Most from AWS KMS: Architecting Applications for High Security

    Vom: 25.12.2016
  18. SEC304: Reduce Your Blast Radius by Using Multiple AWS Accounts Per Region and Service

    Vom: 25.12.2016
  19. SEC305: Scaling Security Resources for Your First 10 Million Customers

    Vom: 25.12.2016
  20. SEC307: Microservices, Macro Security Needs: How Nike Uses a Multi-Layer, End-to-End Security Approach to Protect Microservice-Based Solutions at Scale

    Vom: 25.12.2016

10 / 20

AWS re:Invent 2016

Visit the podcast's native language site