Implementing "Cloud Security Posture Management (CSPM)" through Data Pipeline..!
TechTalkWithRaies
Implementing "Cloud Security Posture Management (CSPM)" through Data Pipeline..!
16:22
Common Messaging Patterns in [Distributed Systems]
TechTalkWithRaies
Common Messaging Patterns in [Distributed Systems]
15:44
JWT | JSON Web Token | A Way To 'Stateless' Authentication!
TechTalkWithRaies
JWT | JSON Web Token | A Way To 'Stateless' Authentication!
27:18
Caching Strategies | Caching Techniques | Caching Patterns
TechTalkWithRaies
Caching Strategies | Caching Techniques | Caching Patterns
19:08
Cryptography | Cryptography Use-Cases | Data Security | Encryption |  Decryption
TechTalkWithRaies
Cryptography | Cryptography Use-Cases | Data Security | Encryption | Decryption
26:51
Introduction to Suricata | Intrusion Detection & Prevention System (IDS/IPS) Tool
TechTalkWithRaies
Introduction to Suricata | Intrusion Detection & Prevention System (IDS/IPS) Tool
27:46
NGINX | Multi Face gateway layer "Lulu"! | API Gateway | Load Balancer | Reverse Proxy
TechTalkWithRaies
NGINX | Multi Face gateway layer "Lulu"! | API Gateway | Load Balancer | Reverse Proxy
20:40
ChatGPT | AI Coding | Live exploring chatGPT smartness!
TechTalkWithRaies
ChatGPT | AI Coding | Live exploring chatGPT smartness!
18:29