Identity and Access Management: Recommended Best Practices for Administrators
U.S. National Security Agency (NSA) and the Cybersecurity Infrastructure Security Agency (CISA) (2023) This paper sets forth the ...
U.S. National Security Agency (NSA) and the Cybersecurity Infrastructure Security Agency (CISA) (2023) This paper sets forth the ...
Iris Anastasiadou, Julinda Beqiraj, Jean-Pierre Gauci (2023) Trends show that most of the computing activity that is performed ...
Department of Defense DoD (2023) The Cybersecurity Reference Architecture (CSRA) is a reference framework intended to be used ...
Dipendra Ghimire, Stuart Charters (2022) Agile software development methods were introduced to minimize problems faced using traditional software ...
Bitkom (2022) Potenziale, Orientierung, Use Cases Download (2.5 MB)
Ben Stopford (2018) Concepts and Patterns for Streaming Services with Apache Kafka Reference: https://sd.blackball.lv/library/Designing_Event-Driven_Systems_(2018).pdf Download (5.2 MB) ...
Marcia Villalba (2022) Brief introduction to Amazon EventBridge How to design an event-driven application Best practices to use ...
Bitkom (2022) In mittlerweile dritter und komplett überarbeiteter Auflage legt Bitkom nun erneut einen umfassenden Social-Media-Leitfaden vor. In ...
Bitkom (2022) Eine Frage, die fast alle Beiträge mehr oder weniger tief durchzieht, ist die, mit welchem Vorgehen ...
Accenture (2021) Talk is cheap, or so the old saying would have us believe. In reality, conversations can ...
Bitkom (2022) Das Gestalten und Betreiben von digitale Lösungen hat in den letzten Jahren deutlich an Komplexität zugenommen. ...
United Nations Development Programme (2022) This Digital Strategy is structured in three main parts: Part 1 – Guiding ...