April 2017
Beginner
404 pages
9h 30m
English
The networking requirements of an application are as critical and complicated as the business problem you are trying to solve. It is important and essential to follow the industry's best practice and guidelines on network configuration so that your application performs well during peak loads without breaking, and so that it is secured from any security breach which might intend to kill the application or, even worse, steal customer-sensitive data. Security can be controlled by adhering to strong networking policies and firewalls restrictions so that communication can be controlled, throttled and monitored across a group of machines (called subnets) and at each instance level. Network configuration also brings ...
Read now
Unlock full access