Pablo Gallardo

Pablo Gallardo

Cybersecurity and IT professional. Find more info at pmgallardo.com

Relational Databases

Tabular or relational databases are those that can be organized in tables. In opposition to tabular or relational databases there is NoSQL databases. Database Normalization You can read more about database normalization on this post. 12 Codd’s Rules The 12…

Key-value Database

A key-value database or key-value store is a type of database. You can read more about databases on this post. It is part of NoSQL databases. You can read more about NoSQL databases on this post. Key-value Store Solutions Key-value…

Free Images Resources

This post features websites that offer free images or pictures. List of Website offering Free Images List of free pictures: Wikimedia Commons Wikimedia Commons is a portal that shares images, sounds and videos. Wikimedia Commons is a project from the…

Information Security Policy Frameworks

This post provides resources to create Information Security policies, standards, procedures and guidelines. Documenting IT Security Policy Frameworks IT Security Policy Framework Document Types IT security policy framework documents: Policy Policies would be like the constitution, while procedures are the…

Serverless Architecture

Function as a Service (FaaS), most commonly known as serverless architecture, is a concept of cloud computing where cloud user can work on code and run it on a server within the cloud without worrying about this server. This server…

Authentication Protocols

This post features computer network authentication protocols. Do not confuse the authentication protocols with the Authentication, Authorization and Accountability (AAA) protocols like RADIUS or TACACS+. Authentication protocols works in the OSI layers 2 and 3, and AAA protocols in layer…