January 2018
Intermediate to advanced
366 pages
9h 7m
English
There are several ways to attack an application. Understanding how to protect microservices is paramount to not having the credibility of the software destroyed in seconds.
Read now
Unlock full access