AWS re:Invent 2016
Podcast készítő AWS
390 Epizód
-
CON312: Deploying Scalable SAP Hybris Clusters using Docker
Közzétéve: 2016. 12. 25. -
SAC314: GxP Compliance in the Cloud
Közzétéve: 2016. 12. 25. -
SAC315: Scaling Security Operations and Automating Governance: Which AWS Services Should I Use?
Közzétéve: 2016. 12. 25. -
SAC316: Security Automation: Spend Less Time Securing Your Applications
Közzétéve: 2016. 12. 25. -
SAC317: IAM Best Practices to Live By
Közzétéve: 2016. 12. 25. -
SAC318: Life Without SSH: Immutable Infrastructure in Production
Közzétéve: 2016. 12. 25. -
SAC319: Architecting Security and Governance Across a Multi-Account Strategy
Közzétéve: 2016. 12. 25. -
SAC320: Deep Dive: Implementing Security and Governance Across a Multi-Account Strategy
Közzétéve: 2016. 12. 25. -
SAC321: Cyber Resiliency – surviving the breach
Közzétéve: 2016. 12. 25. -
SAC322: NEW LAUNCH! AWS Shield—A Managed DDoS Protection Service
Közzétéve: 2016. 12. 25. -
SAC323: NEW SERVICE: Centrally Manage Multiple AWS Accounts with AWS Organizations
Közzétéve: 2016. 12. 25. -
SAC326: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation
Közzétéve: 2016. 12. 25. -
SAC327: No More Ransomware: How Europol, the Dutch Police, and AWS Are Helping Millions Deal with Cybercrime
Közzétéve: 2016. 12. 25. -
SAC401: 5 Security Automation Improvements You Can Make by Using Amazon CloudWatch Events and AWS Config Rules
Közzétéve: 2016. 12. 25. -
SAC402: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security
Közzétéve: 2016. 12. 25. -
SEC301: Audit Your AWS Account Against Industry Best Practices: The CIS AWS Benchmarks
Közzétéve: 2016. 12. 25. -
SEC303: Get the Most from AWS KMS: Architecting Applications for High Security
Közzétéve: 2016. 12. 25. -
SEC304: Reduce Your Blast Radius by Using Multiple AWS Accounts Per Region and Service
Közzétéve: 2016. 12. 25. -
SEC305: Scaling Security Resources for Your First 10 Million Customers
Közzétéve: 2016. 12. 25. -
SEC307: Microservices, Macro Security Needs: How Nike Uses a Multi-Layer, End-to-End Security Approach to Protect Microservice-Based Solutions at Scale
Közzétéve: 2016. 12. 25.
AWS re:Invent 2016
