Chapter 2. Architectures and patterns
Chapter 5. Authentication and authorization
Appendix A. Services for your serverless architecture
Appendix B. Installation and setup
Appendix C. More about authentication and authorization
Appendix E. Models and mapping
3.144.151.126