Open in app

Sign In

Write

Sign In

Miguel A. Calles
Miguel A. Calles

393 Followers

Home

Books

About

Featured Book

Practical Serverless Security: Building Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud
Practical Serverless Security: Building Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud

Apply the basics of security in serverless computing to new or existing projects. This hands-on guide provides practical examples and fundamentals.

2020

·
Miguel A. Calles
Miguel A. Calles

Stories

Published in

Chapter by Chapter

·Pinned

AWS CDK Serverless Cookbook

A Step-by-step Guide to Building a Serverless App in the Cloud — Foreward I started developing serverless applications on Amazon Web Services in 2018. The team used the Serverless Framework heavily. The framework made it simple to begin developing serverless applications on AWS. Over the years, I wanted greater control of provisioning and updating cloud resources. In 2020, my team and I experimented…

AWS

4 min read

AWS CDK Serverless Cookbook
AWS CDK Serverless Cookbook
AWS

4 min read


Published in

AWS in Plain English

·Pinned

Speed up AWS CDK deploys up to 80%

The ts-node package needed the speed boost — The Amazon Web Services Cloud Development Kit is an infrastructure-as-code solution. CDK allows us to write code (in JavaScript, TypeScript, Python, for example) to programmatically deploy resources in our AWS account. CDK is written in TypeScript and uses the ts-node package to deploy. When we run the cdk command in…

AWS

5 min read

Speed up AWS CDK deploys up to 80%
Speed up AWS CDK deploys up to 80%
AWS

5 min read


Published in

Geek Culture

·Pinned

Five scary Linux commands you should not run

These are commands you might have wondered how they work — Caution: Make sure you confirm you are using the terminal in a virtual machine or a container if you decide to run these commands. Running these commands on your actual machine will be catastrophic. Disclaimer: I take no responsibility for the results of running these commands. …

Linux

4 min read

Five scary Linux commands you should not run
Five scary Linux commands you should not run
Linux

4 min read


Published in

Geek Culture

·Pinned

Use Python in Docker, not in your OS

Protect your system from malware and ransomware — We can keep our computers isolated from malicious Python packages and vulnerabilities by using Docker containers. It’s like protecting ourselves from a vicious snake bite. What are Docker containers and why should we use them? Docker is a software technology that creates a container that runs on our computer. …

Python

6 min read

Use Python in Docker, not in your OS
Use Python in Docker, not in your OS
Python

6 min read


8 hours ago

The Hulk Was My Best Friend As A Kid: Advice on Answering Security Questions

Think twice before giving truthful answers to your online banking and services security questions. The answers can sometimes be easy to find online. — Or was it Superman? Did my article title catch your attention? You might be wondering who my best friend was growing up or asking yourself why I am talking about this topic in the first place. It’s because information security still relies on answers to questions (like “Who was your…

Cybersecurity

3 min read

The Hulk Was My Best Friend As A Kid: Advice on Answering Security Questions
The Hulk Was My Best Friend As A Kid: Advice on Answering Security Questions
Cybersecurity

3 min read


8 hours ago

What is Cybersecurity? An anecdote about a Marvel’s Avengers survey

Several years ago, I was at Disney California Adventure. They had a Marvel section set up. One of the attractions was a set of kiosks with an Avengers survey. You answered the survey to learn which Avenger you are most like. …

Cybersecurity

2 min read

What is Cybersecurity? An anecdote about a Marvel’s Avengers survey
What is Cybersecurity? An anecdote about a Marvel’s Avengers survey
Cybersecurity

2 min read


Published in

Chapter by Chapter

·5 days ago

Describing the AWS CDK Application

AWS CDK Serverless Cookbook: Chapter 2 — In the last chapter, we created our CDK app and bootstrapped our AWS account. In this chapter, we will review and modify the CDK app structure. The CDK Folder Structure Open your favorite text editor, integrated development environment (IDE) application, or Microsoft Visual Studio Code[1] (vscode). …

AWS

7 min read

Describing the CDK Application
Describing the CDK Application
AWS

7 min read


May 24

Cybersecurity Books to Read in 2023

I have selected a handful of books that I recommend. I am not an avid reader, but I have greatly enjoyed these books. I hope you enjoy them too. Cyber Crisis by Dr. Eric Cole Good overview for everyone to understand the threats and put security into practice. Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So Far by Ted Demopoulos Read good recommendations on how to progress your…

Cybersecurity

2 min read

Cybersecurity Books to Read in 2023
Cybersecurity Books to Read in 2023
Cybersecurity

2 min read


Published in

Chapter by Chapter

·May 22

Chapter 1 · At the Coffee Shop

The Short Sale · A Novel — The coffee shop is a place to find individuals of a different ilk. At the left corner table, an elderly couple drinks black coffee while reading a newspaper. A college student with bags under her eyes, a computer, and a stack of books is consuming a large, sugary, blended espresso…

Novel

5 min read

Chapter 1 · At the Coffee Shop
Chapter 1 · At the Coffee Shop
Novel

5 min read


Published in

Chapter by Chapter

·May 21

Chapter by Chapter was launched

The publication has two books and some chapters: “The Short Sale” and “AWS CDK Serverless Cookbook.” — The first book idea was “The Short Sale.” The author published the first post with the foreword and table of contents. This book idea is a novel where a disgruntled former homeowner seeks revenge for losing his house. The author said that surprisingly a few years after having the idea the Mr. Robot TV series had the opening scene in the same location as the book idea.

Books

1 min read

Chapter by Chapter was launched
Chapter by Chapter was launched
Books

1 min read

Miguel A. Calles

Miguel A. Calles

393 Followers

Book Author

Engineer · Author · Serverless · Cybersecurity

Following
  • Jenn Leach

    Jenn Leach

  • Gökhan Yalçuk 💎

    Gökhan Yalçuk 💎

  • Anthony Today

    Anthony Today

  • Tony

    Tony

  • Corrie Who Writes

    Corrie Who Writes

See all (188)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech