RAR-files |
lbwx-miqaafi.rar |
50,000,000 |
92B2BA2D |
lbwx-miqaafi.r00 |
50,000,000 |
0EC75108 |
lbwx-miqaafi.r01 |
50,000,000 |
72464E08 |
lbwx-miqaafi.r02 |
50,000,000 |
372E2170 |
lbwx-miqaafi.r03 |
50,000,000 |
0F3DD851 |
lbwx-miqaafi.r04 |
50,000,000 |
5C781FCB |
lbwx-miqaafi.r05 |
50,000,000 |
BABBE96D |
lbwx-miqaafi.r06 |
50,000,000 |
CC5B2708 |
lbwx-miqaafi.r07 |
50,000,000 |
04622263 |
lbwx-miqaafi.r08 |
50,000,000 |
87E88E29 |
lbwx-miqaafi.r09 |
50,000,000 |
BCF02CEE |
lbwx-miqaafi.r10 |
50,000,000 |
3FC971CC |
lbwx-miqaafi.r11 |
50,000,000 |
1DC4BAEA |
lbwx-miqaafi.r12 |
50,000,000 |
97D60368 |
lbwx-miqaafi.r13 |
50,000,000 |
88E420C6 |
lbwx-miqaafi.r14 |
50,000,000 |
1F189724 |
lbwx-miqaafi.r15 |
50,000,000 |
721C3CA4 |
lbwx-miqaafi.r16 |
50,000,000 |
D414240E |
lbwx-miqaafi.r17 |
50,000,000 |
0E5F8924 |
lbwx-miqaafi.r18 |
50,000,000 |
3469BE1D |
lbwx-miqaafi.r19 |
50,000,000 |
2F8A7A1B |
lbwx-miqaafi.r20 |
50,000,000 |
6B3EF3D9 |
lbwx-miqaafi.r21 |
50,000,000 |
B5D702A1 |
lbwx-miqaafi.r22 |
50,000,000 |
A5F3E057 |
lbwx-miqaafi.r23 |
50,000,000 |
A58E464C |
lbwx-miqaafi.r24 |
50,000,000 |
018B3754 |
lbwx-miqaafi.r25 |
50,000,000 |
07484281 |
lbwx-miqaafi.r26 |
50,000,000 |
EACB15EB |
lbwx-miqaafi.r27 |
50,000,000 |
AC3DC8E7 |
lbwx-miqaafi.r28 |
50,000,000 |
4C575BCE |
lbwx-miqaafi.r29 |
50,000,000 |
E4B0B7DE |
lbwx-miqaafi.r30 |
50,000,000 |
85AD003A |
lbwx-miqaafi.r31 |
50,000,000 |
E18C0226 |
lbwx-miqaafi.r32 |
50,000,000 |
79BA810B |
lbwx-miqaafi.r33 |
50,000,000 |
C1F2E242 |
lbwx-miqaafi.r34 |
50,000,000 |
92BA4D8C |
lbwx-miqaafi.r35 |
50,000,000 |
BBC9E8FF |
lbwx-miqaafi.r36 |
50,000,000 |
71AC66F3 |
lbwx-miqaafi.r37 |
34,138,551 |
2070B90F |
|
Total size: |
1,934,138,551 |
|
|
Archived
files |
Chapter_3-Part_2_Microservices\10. Single Responsibility Principle.mp4
[d1c16c3567af3a26]
|
39,565,034 |
04A17A72 |
Chapter_3-Part_2_Microservices\11. Bounded Contexts.mp4
[6fc10d433dac4487]
|
42,127,751 |
51C6014D |
Chapter_3-Part_2_Microservices\12. Domain-Driven Design (DDD) in microservices.mp4
[b2c96efccd250e3d]
|
56,378,528 |
8FDFAF85 |
Chapter_3-Part_2_Microservices\8. Overview.mp4
[124e8646252b2ea3]
|
3,753,201 |
913E0318 |
Chapter_3-Part_2_Microservices\9. Understanding Single Responsibility Principle with a Diagram.mp4
[df3670bca8d34251]
|
7,898,044 |
311F1E63 |
Chapter_4-Part_3_Designing_Microservices\13. Overview.mp4
[ee056e9c7dc8b982]
|
7,660,409 |
6384850D |
Chapter_4-Part_3_Designing_Microservices\14. Service decomposition strategies.mp4
[64721855abfb0203]
|
43,163,260 |
FA78163D |
Chapter_4-Part_3_Designing_Microservices\15. API design and versioning.mp4
[51dd930bee2dc010]
|
41,020,592 |
26CD96E6 |
Chapter_4-Part_3_Designing_Microservices\16. Event-driven architecture.mp4
[7bc64a89239b095e]
|
48,756,705 |
62A57787 |
Chapter_5-Part_4_Inter_Service_Communication\17. Overview.mp4
[84e062d5b2b0f121]
|
8,016,421 |
B2C8A0B7 |
Chapter_5-Part_4_Inter_Service_Communication\18. Synchronous vs. asynchronous communication.mp4
[dcc5e38785bbaeab]
|
42,552,532 |
78F90F5B |
Chapter_5-Part_4_Inter_Service_Communication\19. RESTful APIs.mp4
[3fbc6b51470930a2]
|
47,548,070 |
BAAE8902 |
Chapter_5-Part_4_Inter_Service_Communication\20. Message queues and event streaming.mp4
[f1143c1d0cbea557]
|
47,689,837 |
F2BC74B9 |
Chapter_6-Part_6_Microservices_Pattern\21. Overview.mp4
[3864ff4bd11ff57c]
|
5,823,522 |
E158164E |
Chapter_6-Part_6_Microservices_Pattern\22. Saga pattern.mp4
[30fc65a6d721c980]
|
34,210,640 |
3899547A |
Chapter_6-Part_6_Microservices_Pattern\23. Bulkhead pattern.mp4
[f39c55f21bc1e5a5]
|
35,920,890 |
05E1293F |
Chapter_6-Part_6_Microservices_Pattern\24. Circuit Breaker pattern.mp4
[fc0278866487ee2f]
|
38,977,589 |
44B08084 |
Chapter_7-Part_7_Data_Management_in_Microservices\25. Overview.mp4
[64f1974dcd508ccd]
|
7,336,626 |
E6EF1DF7 |
Chapter_7-Part_7_Data_Management_in_Microservices\26. Database per service pattern.mp4
[9025d3f00a7a8023]
|
47,678,744 |
4265CE8D |
Chapter_7-Part_7_Data_Management_in_Microservices\27. Distributed transactions.mp4
[c6822bef4f6ad90b]
|
49,223,430 |
3E83BCAD |
Chapter_7-Part_7_Data_Management_in_Microservices\28. CQRS and Event Sourcing.mp4
[b2171dbffd97f629]
|
42,445,879 |
08DEE7B7 |
Chapter_7-Part_7_Data_Management_in_Microservices\29. Polyglot persistence.mp4
[2789123c86a6d69d]
|
55,961,790 |
7335A515 |
Chapter_8-Part_8_Service_Discovery_and_Load_Balancing\30. Overview.mp4
[3e070ce7653823a0]
|
8,389,040 |
9B53C5AE |
Chapter_8-Part_8_Service_Discovery_and_Load_Balancing\31. Service registry and discovery patterns.mp4
[948596e3738de082]
|
33,695,822 |
1E56B58B |
Chapter_8-Part_8_Service_Discovery_and_Load_Balancing\32. Client-side vs. server-side load balancing.mp4
[122a6ba763f4c774]
|
43,402,402 |
FACB97DF |
Chapter_8-Part_8_Service_Discovery_and_Load_Balancing\33. Service mesh concepts.mp4
[985a92fd9499d103]
|
39,391,195 |
FEC78F02 |
Chapter_9-Part_9_Deployment_and_Scaling\34. Overview.mp4
[dd7c954497c6fc1]
|
7,376,017 |
5AC31417 |
Chapter_9-Part_9_Deployment_and_Scaling\35. Containerization (Docker).mp4
[6296f0afdd8e8f2f]
|
40,734,266 |
C82C680F |
Chapter_9-Part_9_Deployment_and_Scaling\36. Orchestration (Kubernetes).mp4
[80bd5c44d3627604]
|
46,287,787 |
7330F442 |
Chapter_9-Part_9_Deployment_and_Scaling\37. CICD for microservices.mp4
[238250b2c28c5cd3]
|
47,122,551 |
7F3AEAFC |
Chapter_10-Part_10_Monitoring_and_Logging\38. Overview.mp4
[b3e2f87832adbbe6]
|
6,510,241 |
B4D0257D |
Chapter_10-Part_10_Monitoring_and_Logging\39. Distributed tracing.mp4
[73a21625d81bf5b5]
|
48,272,310 |
AE5A8DC0 |
Chapter_10-Part_10_Monitoring_and_Logging\40. Centralized logging.mp4
[47121953752066b1]
|
52,831,954 |
8E3B2739 |
Chapter_10-Part_10_Monitoring_and_Logging\41. Health checks and circuit breakers.mp4
[3ee40c292ba2abd5]
|
39,043,223 |
E61ED088 |
Chapter_11-Part_11_Security_in_Microservices\42. Overview.mp4
[6453020287d11875]
|
4,946,699 |
E243DD26 |
Chapter_11-Part_11_Security_in_Microservices\43. Authentication and authorization.mp4
[36aeead2fa85478f]
|
46,830,317 |
3C1596AF |
Chapter_11-Part_11_Security_in_Microservices\44. API gateways.mp4
[3257876a90ac7bff]
|
43,582,048 |
3BD96F34 |
Chapter_11-Part_11_Security_in_Microservices\45. Securing inter-service communication.mp4
[787a77c26593428d]
|
44,913,600 |
A3512B33 |
Chapter_12-Part_12_Testing_Microservices\46. Overview.mp4
[7b7bec16d5c8169a]
|
4,016,679 |
7F4E4039 |
Chapter_12-Part_12_Testing_Microservices\47. Unit testing.mp4
[8f6a73ef45f8ad96]
|
42,055,249 |
07F6FAC8 |
Chapter_12-Part_12_Testing_Microservices\48. Integration testing.mp4
[2adaea29d78f879d]
|
45,479,551 |
4F6C3CD5 |
Chapter_12-Part_12_Testing_Microservices\49. Contract testing.mp4
[b90c23753540fd77]
|
50,612,143 |
997B06E6 |
Chapter_13-Part_13_Microservices_vs_Monolithic_Architecture\50. Comparison and trade-offs.mp4
[132926d22e21ceec]
|
43,472,178 |
3BC06A83 |
Chapter_13-Part_13_Microservices_vs_Monolithic_Architecture\51. Migration strategies.mp4
[45605b170a066cb5]
|
44,441,774 |
30E60F33 |
Chapter_13-Part_13_Microservices_vs_Monolithic_Architecture\52. When to use microservices.mp4
[24f2c5089320dd71]
|
48,829,437 |
215D5837 |
Chapter_14-Part_14_Best_Practices_and_Anti_patterns\53. Microservices best practices.mp4
[368b93e4c2a26466]
|
39,313,198 |
BACFF6B0 |
Chapter_14-Part_14_Best_Practices_and_Anti_patterns\54. Common pitfalls and how to avoid them.mp4
[5ef7f1d2acced613]
|
54,056,804 |
983B0EDB |
Chapter_15-Part_15_Future_Trends_in_Microservices\55. Serverless architecture.mp4
[519b529032c246b6]
|
39,918,829 |
02638FAB |
Chapter_15-Part_15_Future_Trends_in_Microservices\56. AI and ML in microservices.mp4
[12b9b3a1cb4db2e]
|
50,747,767 |
7AAF6674 |
Chapter_1-Course_Overview\1. Course Coverage.mp4
[5d867c81e1c01798]
|
46,357,652 |
BA13001A |
Chapter_1-Course_Overview\3. Emerging patterns and technologies In Microservices.mp4
[427f7228821f8429]
|
47,282,990 |
EBC048F8 |
Chapter_2-Part_1_Introduction_to_Microservices\4. What is a microservice.mp4
[8b84d78343a5772b]
|
12,718,904 |
FF816AF8 |
Chapter_2-Part_1_Introduction_to_Microservices\5. How does a microservices architecture differ from a monolithic architecture.mp4
[949b6d9985778be4]
|
19,043,192 |
8D61DC27 |
Chapter_2-Part_1_Introduction_to_Microservices\6. Definition and core concepts.mp4
[7f699a154594a393]
|
27,517,559 |
8CF7BE2C |
Chapter_2-Part_1_Introduction_to_Microservices\7. Advantages of using Microservices.mp4
[2ecf6523d65337cf]
|
11,222,357 |
4CC9B8AA |
Chapter_3-Part_2_Microservices |
0 |
00000000 |
Chapter_4-Part_3_Designing_Microservices |
0 |
00000000 |
Chapter_5-Part_4_Inter_Service_Communication |
0 |
00000000 |
Chapter_6-Part_6_Microservices_Pattern |
0 |
00000000 |
Chapter_7-Part_7_Data_Management_in_Microservices |
0 |
00000000 |
Chapter_8-Part_8_Service_Discovery_and_Load_Balancing |
0 |
00000000 |
Chapter_9-Part_9_Deployment_and_Scaling |
0 |
00000000 |
Chapter_10-Part_10_Monitoring_and_Logging |
0 |
00000000 |
Chapter_11-Part_11_Security_in_Microservices |
0 |
00000000 |
Chapter_12-Part_12_Testing_Microservices |
0 |
00000000 |
Chapter_13-Part_13_Microservices_vs_Monolithic_Architecture |
0 |
00000000 |
Chapter_14-Part_14_Best_Practices_and_Anti_patterns |
0 |
00000000 |
Chapter_15-Part_15_Future_Trends_in_Microservices |
0 |
00000000 |
Chapter_1-Course_Overview |
0 |
00000000 |
Chapter_2-Part_1_Introduction_to_Microservices |
0 |
00000000 |
|
Total size: |
1,934,125,229 |
|
|