Learn Application Architecture
Study Application Architecture using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Computer Science IB
Computer Science IB
By: Kay Lau
1.1 Planning and System Installation, 1.1 User Focus, 1.1 System Backup...17Decks174Flashcards6Learners -
(5) Comptia Security + SY0-601
(5) Comptia Security + SY0-601
By: Maciej Węgrzynowski
Chapter 1 Threats, Attacks, and Vulnerabilities, Chapter 2 Type of Attack Indicators, Chapter 3 Application Attack Indicators...12Decks329Flashcards5Learners -
CISSP
CISSP
By: David Caranfa
Risk Management, Controls, BC/DC...27Decks183Flashcards1Learner -
Scalability and System Design (software engineering)
Scalability and System Design (software engineering)
By: Justin Buckner
Scalability, Understanding the system of Scalability, Understanding Web Application and Software Architecture ( Go step by step thru the different concepts, functions, and components involved in architecting a web application)...7Decks44Flashcards7Learners -
AWS - Solutions Architect
AWS - Solutions Architect
By: Deleted Deleted
Module 2: Introducing Cloud Architecting, Module 3: Adding a Storage Layer (Simple Storage Service), Module 4: Adding a Compute Layer...14Decks141Flashcards25Learners -
AWS Solutions Architect -- Associate
AWS Solutions Architect -- Associate
By: Jon Simpson
Section 4: IAM & AWS CLI, Section 5/6: EC2 Fundamentals & Solutions Architecture, Section 7: EC2 Instance Storage...15Decks348Flashcards2Learners -
Gene 30002 organizations and fuction
Gene 30002 organizations and fuction
By: tran tinchi
W1 L1 what is a gene, W1 L2 gene structure, organization and regulation, W1 L2 RNA Processing T...25Decks458Flashcards2Learners -
CCSK
CCSK
By: UNKNOWN T
1. Cloud Computing Concepts and Architectures - DONE, 2. Governance and Enterprise risk management - DONE, 3. “Legal Issues, Contracts, and Electronic Discovery” - DONE...15Decks542Flashcards2Learners -
arqui
arqui
By: Diego Emanuel Civini
Atributos de calidad, Estilos arquitectonicos, Web y REST...7Decks111Flashcards3Learners -
(2) Comptia Security + SY0-601
(2) Comptia Security + SY0-601
By: Maciej Węgrzynowski
Chapter 1 Threats, Attacks, and Vulnerabilities, Chapter 2 Type of Attack Indicators, Chapter 3 Application Attack Indicators...12Decks329Flashcards4Learners -
CISSP Domain 8
CISSP Domain 8
By: Maximilian Ernst
Basic Architecture RDBMS, Types of storage, Machine Learning & Neural Networks...14Decks103Flashcards5Learners -
Network+
Network+
By: Emmanuel Barber-Thomas
Lesson 2: Deploying Ethernet Cabling, Lesson 3: Deploying Ethernet Switching, Lesson 4: Troubleshooting Ethernet Networks...19Decks1,043Flashcards3Learners -
Mobile Application and Development
Mobile Application and Development
By: Gielyn Gener
L1 Intro and Concept, L1 - History of android, L2 - Android Architecture...4Decks92Flashcards2Learners -
CS
CS
By: Jane Lee
CS Test, CS Last Unit 1 Test, Topic 2 test...18Decks296Flashcards1Learner -
Internet Applications And Techniques
Internet Applications And Techniques
By: Chloe Alsop
Web Application Fundementals, Node.js Theory, Node.js Security and Architecture...6Decks94Flashcards3Learners -
CS2003
CS2003
By: Rhona McCracken
N1. Internet Overview, N2. Basic Architecture, N3. TCP client-server...22Decks259Flashcards5Learners -
Computer Science Grouped
Computer Science Grouped
By: Edward Price
SLR 01 - CPU Architecture, SLR 10 - Databases, SLR 12 - Web Technologies...7Decks65Flashcards5Learners -
AWS 2
AWS 2
By: David Morales
AWS Overview, IAM Users & Groups, EC2 Elastic Cloud Compute...37Decks363Flashcards1Learner -
Software Development Context and Methodologies
Software Development Context and Methodologies
By: Stacey Whitehead
Business context and market environment, Software Development Context and Methodologies, SCRUM...16Decks133Flashcards4Learners -
CISSP
CISSP
By: Eric Lekus
Chapter 1 Security Governance Through Principles and Policies, Chapter 2 Personnel Security and Risk Management, Chapter 3 Business Continuity Planning...22Decks524Flashcards1Learner -
CCNA
CCNA
By: Connor Herring
Chapter 1 - Introduction to Networking, Chapter 2 - Fundamentals of Ethernet LANs, Chapter 3 - Fundamentals of WANs and IP Routing...50Decks1,379Flashcards24Learners -
CISSP 2019 (tms005)
CISSP 2019 (tms005)
By: Tuck Meng Siew
Chapter 1– Security Governance through Principles and Policies, Chapter 2– Personnel Security and Risk Management Concepts, Chapter 3– Business Continuity Planning...21Decks290Flashcards36Learners -
Information Systems
Information Systems
By: Tyreece Simpson
IS and their Impact, IS in Business, IS Architecture...6Decks147Flashcards1Learner -
IAS - Midterms
IAS - Midterms
By: John Paul Birol
Security Objectives, OSI Security Architecture, Passive Attack...11Decks58Flashcards1Learner -
CompTIA Security+ SY0-501 - Based on Objectives X
CompTIA Security+ SY0-501 - Based on Objectives X
By: xavier Xavier
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks....45Decks887Flashcards15Learners -
CISSP Study Guide
CISSP Study Guide
By: Enosh Chang
Security Governance Through Principles and Policies, Personnel Security and Risk Management Concepts, Business Continuity Planning...21Decks420Flashcards1Learner -
CompTIA Security+ SY0-501 - Objectives
CompTIA Security+ SY0-501 - Objectives
By: Eliza Hazard
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks....45Decks887Flashcards11Learners -
CompTIA Security+
CompTIA Security+
By: Sara Sofia
Social Engineering, Attack Types, Recognizing Application Attacks...7Decks163Flashcards1Learner -
Middleware
Middleware
By: Pedro Dusso
1 - Motivation, 2 - Distributed Information Systems Architecture, 3 - DB-Gateways...10Decks171Flashcards4Learners -
I40(0/1/2) Computer Science Bsc Year 1
I40(0/1/2) Computer Science Bsc Year 1
By: Aria Noroozi
ECM 1407 Electronic Machines, ECM 1407 The History of Computing, ECM 1407 Encryption...40Decks731Flashcards2Learners