H1 2024 Threat Horizons Report
Google (2024) This iteration of the Google Cloud Threat Horizons Report provides a forward-thinking view of cloud security ...
Google (2024) This iteration of the Google Cloud Threat Horizons Report provides a forward-thinking view of cloud security ...
U.S. National Security Agency (2024) 1. Uphold the Cloud Shared Responsibility Model 2. Use Secure Cloud Identity and ...
KPMG (2023) This point of view takes a closer look into what API management involves, the value of ...
U.S. CYBERSECURIT Y AND INFRASTRUCTURE SECURIT Y AGENCY (November 2023) This “2023–2024 CISA Roadmap for Artificial Intelligence” serves ...
U.S. National Security Agency (NSA) and the Cybersecurity Infrastructure Security Agency (CISA) (2023) This paper sets forth the ...
Iris Anastasiadou, Julinda Beqiraj, Jean-Pierre Gauci (2023) Trends show that most of the computing activity that is performed ...
Department of Defense DoD (2023) The Cybersecurity Reference Architecture (CSRA) is a reference framework intended to be used ...
Dipendra Ghimire, Stuart Charters (2022) Agile software development methods were introduced to minimize problems faced using traditional software ...
Bitkom (2022) Potenziale, Orientierung, Use Cases Download (2.5 MB)
Ben Stopford (2018) Concepts and Patterns for Streaming Services with Apache Kafka Reference: https://sd.blackball.lv/library/Designing_Event-Driven_Systems_(2018).pdf Download (5.2 MB) ...
Marcia Villalba (2022) Brief introduction to Amazon EventBridge How to design an event-driven application Best practices to use ...
Bitkom (2022) In mittlerweile dritter und komplett überarbeiteter Auflage legt Bitkom nun erneut einen umfassenden Social-Media-Leitfaden vor. In ...