Learn Application Architecture
Study Application Architecture using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(20)
Decks
Flashcards
Learners
-
AWS Solution Architect Certification Classes
AWS Solution Architect Certification Classes
By: Damilola Owolabi
Design High Performing Architectures, AWS Design Secure Architecture, Data Resilient Architecture ...6Decks25Flashcards1Learner -
CompTIA Network + N10-008
CompTIA Network + N10-008
By: Danny Mishler
1.1 (OSI) model layers and encapsulation concepts, 1.2 Explain the characteristics of network topologies and network types., 1.3 Summarize the types of cables and connectors and explain which is the appropriate type for a solution. ...26Decks147Flashcards8Learners -
CCSK Certification
CCSK Certification
By: Kal Krishnan
Domain 1 - Cloud Computing Concepts and Architecture, Domain 2 - Governance & Risk Management, Domain 3 - Legal Issues, Contracts and Electronic Discovery ...13Decks90Flashcards3Learners -
Net+ N10-008
Net+ N10-008
By: Carlos Lorenzo
1.1 Compare and contrast the Open Systems Interconnection (OSI) model layers and encapsulation concepts, 1.2 Explain the characteristics of network topologies and network types, 1.3 Summarize the types of cables and connectors and explain which is the appropriate type for a solution. ...26Decks93Flashcards6Learners -
Javascript refrence
Javascript refrence
By: Travis R
Functions, Array Obj properties and methods, General Javascript knowledge and concepts ...40Decks120Flashcards4Learners -
Solutions Architect Coursera
Solutions Architect Coursera
By: Heriberto Salcido
Domain 1 - Design Resilient Architectures, Domain 2 - Design High-Performing Architectures, Domain 3 - Design Secure Applications and Architectures ...4Decks29Flashcards1Learner -
OCR A-Level Computer Science
OCR A-Level Computer Science
By: Gavin Nkalubo
Systems analysis methods, Compression, Lossless compression ...22Decks143Flashcards1Learner -
BIGDATA & IOT 600
BIGDATA & IOT 600
By: Mignon Rossouw
Chapter 1: Big Data Analysis and 4 Extraction Techniques, Chapter 2: IoT applications and architectures2Decks20Flashcards1Learner -
AWS Cloud Practitioner (CLF-C01)
AWS Cloud Practitioner (CLF-C01)
By: Amit Topiwala
Learning Path Introduction, Cloud Concepts - Introduction, Cloud Concepts - What is Cloud Computing? ...39Decks322Flashcards1Learner -
Secure Computer Networks
Secure Computer Networks
By: Callum O'Hare
Internet Architecture, Internet Applications, Network Edge, Physical and Link Layers ...7Decks24Flashcards1Learner -
04 Tools of the Trade: Linux and SQL
04 Tools of the Trade: Linux and SQL
By: Amreek Paul
WK 1 The Wonderful World of Operating Systems, WK1 Inside the Operating System, WK1 Requests to the operating system ...43Decks261Flashcards1Learner -
Softwaretechnik II
Softwaretechnik II
By: Moritz Br
Clean Code, Architecture, Components ...6Decks32Flashcards1Learner -
Security+
Security+
By: Anne Leach
1. Malware and IOC, 2. Attacks, 3. Threat Actors ...29Decks66Flashcards1Learner -
CompTIA ITF+ (Software Management)
CompTIA ITF+ (Software Management)
By: Mark Latysh
Software Types, Web Browsers, Application Delivery ...6Decks26Flashcards1Learner -
CISSP
CISSP
By: Timothy Southern
Chapter 1 - Security Governance Through Principles and Policies, Chapter 2 - Personnel Security and Risk Management Concepts, Chapter 3 - Business Continuity Planning ...22Decks38Flashcards1Learner -
CompTIA Security+ Certification Exam
CompTIA Security+ Certification Exam
By: Fareedah James
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks., 1.3 Explain threat actor types and attributes. ...37Decks130Flashcards1Learner -
coursera
coursera
By: Evin Hayes
Database fundamentals, computing platforms and software applications, Explore technology concepts and application architecture3Decks18Flashcards1Learner -
IT Security
IT Security
By: Kinzi Catalano
Cryptography Applications, 3 As, Secure Network Architecture ...6Decks25Flashcards1Learner -
Professional Computing
Professional Computing
By: Harry Mitchell
Hardware, Networks, Software ...20Decks119Flashcards1Learner -
CISSP
CISSP
By: Jennifer Toren
Chapter 1: Security Governance, Chapter 2: Personnel Security and Risk Management Concepts, Chapter 3: Business Continuity Planning ...21Decks19Flashcards1Learner