Learn Application Architecture
Study Application Architecture using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
OCR GCSE Computer Science
OCR GCSE Computer Science
By: James Highton
Data Representation [1.1], Impacts of Digital Technology [1.2], Registers and Common CPU Components [1.3] ...32Decks484Flashcards58Learners -
CompTIA A+
CompTIA A+
By: Eric Skiff
1.10 Bluetooth, GPS, and Mobile Device Management Overview, 1.12 Overview of Laptop Display Technologies and Features, 1.14 Understanding Hard Drives and Storage Technologies ...98Decks1,871Flashcards4Learners -
05 - Computer Security
05 - Computer Security
By: Gabriel Miki
x86 - Theory, Buffer Overflow - Theory, Format String Theory ...10Decks237Flashcards1Learner -
LPI - 03 Web Development Essentials
LPI - 03 Web Development Essentials
By: Mike McCollum
1. Understanding Software Development and Web Technologies, 2. Working with HTML Content, 3. Controlling HTML with CSS ...10Decks417Flashcards1Learner -
CTA
CTA
By: b d
Module 1 Overview of Cloud Computing, Module 2 Cloud Adoption and Emerging Technologies, Module 3 Cloud Computing Service and Deployment Models ...24Decks237Flashcards1Learner -
CYBR 158
CYBR 158
By: Lateefat Alimi
MOD 7 - Physical Security, MOD 1 - Security Concepts and Governance, MOD 8 - Midterm ...15Decks378Flashcards2Learners -
BDS 2: Oral Ecosystems
BDS 2: Oral Ecosystems
By: Khadija Karamat
OE L1 Early Tooth Development, OE L2 Early Tooth Development (Mes-Epi Interactions), OE L3 Dentinogenesis ...42Decks1,018Flashcards6Learners -
CCSK v4 flashcards
CCSK v4 flashcards
By: Mohammed Al-Meshari
Domain 1 - Cloud Computing Concepts and Architectures, Domain 2 - Governance and Enterprise Risk Management, Domain 3 - Legal Issues, Contracts and E-discovery ...11Decks238Flashcards10Learners -
Course 5 - IT Security: Defense against the digital dark arts
Course 5 - IT Security: Defense against the digital dark arts
By: Jelly Santi
Week 1 - Malicious Software, Week 1 - Network Attacks, Week 1 - Other Attacks ...11Decks187Flashcards4Learners -
CISSP Domain 8
CISSP Domain 8
By: Maximilian Ernst
Basic Architecture RDBMS, Types of storage, Machine Learning & Neural Networks ...14Decks103Flashcards6Learners -
Computer Netwoks
Computer Netwoks
By: Ben Carlson
Lesson 1: Intro, History, and Internet Architecture, Lesson 2: Transport and Application Layers, Lesson 3: Intradomain Routing3Decks46Flashcards5Learners -
Computer Science IB
Computer Science IB
By: Kay Lau
1.1 Planning and System Installation, 1.1 User Focus, 1.1 System Backup ...17Decks174Flashcards6Learners -
AWS - Solutions Architect
AWS - Solutions Architect
By: Deleted Deleted
Module 2: Introducing Cloud Architecting, Module 3: Adding a Storage Layer (Simple Storage Service), Module 4: Adding a Compute Layer ...14Decks141Flashcards22Learners -
CISSP
CISSP
By: David Caranfa
Risk Management, Controls, BC/DC ...27Decks183Flashcards1Learner -
Certified Cloud Security Professional (CCSP)
Certified Cloud Security Professional (CCSP)
By: keegz Whodis?
(ISC)² Certified Cloud Security Professional Exam 1 (CCSP) Practice (Aris Athanasiou), (ISC)² Certified Cloud Security Professional Exam 2 (CCSP) Practice (Aris Athanasiou), (ISC)² Certified Cloud Security Professional Exam 3 (CCSP) Practice (Aris Athanasiou) ...26Decks2,246Flashcards276Learners -
Mobile Application and Development
Mobile Application and Development
By: Gielyn Gener
L1 Intro and Concept, L1 - History of android, L2 - Android Architecture ...4Decks92Flashcards2Learners -
IAS - Midterms
IAS - Midterms
By: John Paul Birol
Security Objectives, OSI Security Architecture, Passive Attack ...11Decks58Flashcards1Learner -
Scalability and System Design (software engineering)
Scalability and System Design (software engineering)
By: Justin Buckner
Scalability, Understanding the system of Scalability, Understanding Web Application and Software Architecture ( Go step by step thru the different concepts, functions, and components involved in architecting a web application) ...7Decks44Flashcards6Learners -
Computer Science Grouped
Computer Science Grouped
By: Edward Price
SLR 01 - CPU Architecture, SLR 10 - Databases, SLR 12 - Web Technologies ...7Decks65Flashcards5Learners -
(5) Comptia Security + SY0-601
(5) Comptia Security + SY0-601
By: Maciej Węgrzynowski
Chapter 1 Threats, Attacks, and Vulnerabilities, Chapter 2 Type of Attack Indicators, Chapter 3 Application Attack Indicators ...12Decks329Flashcards5Learners -
AWS 2
AWS 2
By: David Morales
AWS Overview, IAM Users & Groups, EC2 Elastic Cloud Compute ...37Decks363Flashcards1Learner -
AWS Solutions Architect -- Associate
AWS Solutions Architect -- Associate
By: Jon Simpson
Section 4: IAM & AWS CLI, Section 5/6: EC2 Fundamentals & Solutions Architecture, Section 7: EC2 Instance Storage ...15Decks348Flashcards2Learners -
CS
CS
By: Jane Lee
CS Test, CS Last Unit 1 Test, Topic 2 test ...18Decks296Flashcards1Learner -
Software Development Context and Methodologies
Software Development Context and Methodologies
By: Stacey Whitehead
Business context and market environment, Software Development Context and Methodologies, SCRUM ...16Decks133Flashcards4Learners -
Gene 30002 organizations and fuction
Gene 30002 organizations and fuction
By: tran tinchi
W1 L1 what is a gene, W1 L2 gene structure, organization and regulation, W1 L2 RNA Processing T ...25Decks458Flashcards2Learners -
(2) Comptia Security + SY0-601
(2) Comptia Security + SY0-601
By: Maciej Węgrzynowski
Chapter 1 Threats, Attacks, and Vulnerabilities, Chapter 2 Type of Attack Indicators, Chapter 3 Application Attack Indicators ...12Decks329Flashcards4Learners -
CCSK
CCSK
By: UNKNOWN T
1. Cloud Computing Concepts and Architectures - DONE, 2. Governance and Enterprise risk management - DONE, 3. “Legal Issues, Contracts, and Electronic Discovery” - DONE ...15Decks542Flashcards2Learners -
Internet Applications And Techniques
Internet Applications And Techniques
By: Chloe Alsop
Web Application Fundementals, Node.js Theory, Node.js Security and Architecture ...6Decks94Flashcards3Learners -
CISSP 2019 (tms005)
CISSP 2019 (tms005)
By: Tuck Meng Siew
Chapter 1– Security Governance through Principles and Policies, Chapter 2– Personnel Security and Risk Management Concepts, Chapter 3– Business Continuity Planning ...21Decks290Flashcards35Learners -
AWS SA Certification - Associate
AWS SA Certification - Associate
By: Andrea Coda
Architecture 101, AWS Architecture 101, AWS Product Fundamentals ...34Decks161Flashcards24Learners