PluralSight – Introduction to Amazon Kinesis Analytics

PluralSight – Introduction to Amazon Kinesis Analytics Bookware-KNiSO
English | Size: 16.19 MB
Category: Tutorial


This is an introductory course on Amazon Kinesis Analytics, which helps you query streaming data or build entire streaming applications using SQL. In this course, we discuss how the service collects, processes and analyzes streaming data in real-time. We also discuss how to use and monitor Amazon Kinesis Analytics and explore use cases

PluralSight – Amazon Aurora Service Introduction

PluralSight – Amazon Aurora Service Introduction Bookware-KNiSO
English | Size: 45.05 MB
Category: Tutorial


Release Notes: This course introduces you to Amazon Aurora, the service that provides open-source database compatibility for AWS customers. This course introduces you to the service and its core features and capabilities

PluralSight – Protecting Sensitive Data From Exposure in ASP.NET and ASP.NET Core Applications

PluralSight – Protecting Sensitive Data From Exposure in ASP NET and ASP NET Core Applications Bookware-KNiSO
English | Size: 149.93 MB
Category: Tutorial


Unprotected sensitive data is one of the top vulnerabilities facing applications today. In this course, Protecting Sensitive Data From Exposure in ASP.NET and ASP.NET Core Applications, you’ll learn how to prevent attackers exploiting personal information, passwords, credit card numbers, or other sensitive data. First, you’ll learn how to classify your data, determining what is potentially sensitive. Next, you’ll discover the protection controls you need to consider when working with sensitive data. Finally you’ll explore how cryptographic and tokenization techniques can help keep this data safe while remaining usable. When you’re finished with this course, you’ll have the skills and knowledge needed to protect your system’s sensitive data from potential exposure

PluralSight – Cryptography Principles for IT Professionals and Developers

PluralSight – Cryptography Principles for IT Professionals and Developers Bookware-KNiSO
English | Size: 337.79 MB
Category: TUtorial


Cryptography is at the heart of all information security, from administering infrastructure to writing secure code. To be effective, you need to understand how cryptography works and how far it can be trusted. In this course, Cryptography Principles for IT Professionals and Developers, you will learn to apply cryptographic algorithms to keep your systems safe. First, you will learn the nature of information and see how that understanding directly informs the tools that you choose. Next, you will apply those tools to protect secrets documents, and systems under your control. Finally, you will explore how to create new tools by coding against cryptographic libraries in C# and Java. When you are finished with this course, you will have the skills and knowledge of cryptography needed to select and apply the correct algorithms to build a complete cryptosystem, and keep your users safe

PluralSight – Internet of Things IoT Executive Briefing

PluralSight – Internet of Things IoT Executive Briefing Bookware-KNiSO
English | Size: 308.63 MB
Category: Tutorial


Internet of Things (IoT) has been an increasing popular term over the last few years, whereas it seemed a sci-fi nerdy dream and great plot for a movie at first, it’s now everywhere around us and still growing. Chances are that it’s the best next step for your organization at this point to implement more IoT. In this course, Internet of Things (IoT): Executive Briefing, you ll learn to talk about IoT, and you ll know what the best steps are to implement IoT in your organization to keep up with or even get ahead of the competition. First you ll delve into what IoT is. Next, you ll explore the trends and characteristics in this field. Finally, you ll discover what to take into account when you have to deal with the IoT within your organization or personal life. When you re finished with this course, you ll have the skills and knowledge of IoT needed to understand its implications and the adoption processes of IoT applications