Explain how basic authentication over TLS can help us secure APIs.
Are TLS connections immune to eavesdropping?
Describe the steps in the three-legged OAuth2 flow.
What is the benefit of using protocol buffers compared to JSON for request/response payloads?
Describe the different RPC modes that are supported by gRPC.
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.