Logical Access Protection: Securing the use of your AWS account with IAM

From AWS Security by Dylan Shields

This article deals with methods you can use to secure your AWS account.

Writing and Managing Application Logs with Docker

From Learn Docker in a Month of Lunches by Elton Stoneman

Logging is usually the most boring part of learning a new technology, but it’s not the case with Docker. The basic principle is simple: you need to make sure your application logs are written to the standard output stream, because this is where Docker looks for them. This can be achieved in a couple of ways, which we’ll cover in this article, and then the fun begins.

Leverage cloud-based machine learning services

From Serverless Machine Learning in Action by Carl Osipov

AWS Automation with AWS CloudFormation

From AWS CloudFormation in Action by Chuck Gehman

Learn Kubernetes from the ground up

From Learn Kubernetes in a Month of Lunches by Elton Stoneman

Making Sense of Distributed Ledger Technologies

From Permissioned Blockchains in Action by Mansoor Ahmed-Rengers & Marta Piekarska-Geater

Defending AWS-Based Systems

From AWS Security by Dylan Shields

Taking a deep dive into Kubernetes

From Core Kubernetes by Jay Vyas and Chris Love

The Definitive Guide to Kubernetes

From Kubernetes in Action, Second Edition by Marko Lukša

© 2020 Manning — Design Credits