Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,058
- Application software 975
- Java (Computer program language) 452
- Cloud computing 327
- Application program interfaces (Computer software) 301
- Engineering & Applied Sciences 299
- Web site development 286
- Python (Computer program language) 271
- Computer Science 250
- Computer programming 242
- JavaScript (Computer program language) 231
- Web applications 220
- Programming 191
- Computer programs 190
- Microsoft .NET Framework 179
- Computer software 175
- Design 167
- Web sites 162
- Internet programming 153
- Machine learning 145
- Artificial intelligence 140
- Mobile computing 126
- Open source software 123
- Programming languages (Electronic computers) 121
- Computer networks 120
- Android (Electronic resource) 119
- Management 114
- Data mining 109
- Software engineering 107
- Web services 101
-
2281Publicado 2023Tabla de Contenidos: “…Data Center Computing -- Rent Instead of Own Resources -- Pay-as-You-Go-for-What-You-Use Model -- Elastic Resource Allocation -- Specialized Services -- Summary -- Exam Essentials -- Review Questions -- Chapter 2 Google Cloud Computing Services -- Computing Components of Google Cloud -- Computing Resources -- Storage Components of Google Cloud -- Storage Resources -- Databases -- Networking Components of Google Cloud -- Networking Services -- Identity Management and Security -- Development Tools -- Additional Components of Google Cloud -- Management and Observability Tools -- Specialized Services -- Summary -- Exam Essentials -- Review Questions -- Chapter 3 Projects, Service Accounts, and Billing -- How Google Cloud Organizes Projects and Accounts -- Google Cloud Resource Hierarchy -- Organization Policies -- Managing Projects -- Roles and Identities -- Roles in Google Cloud -- Granting Roles to Identities -- Service Accounts -- Billing -- Billing Accounts -- Billing Budgets and Alerts -- Exporting Billing Data -- Enabling APIs -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Introduction to Computing in Google Cloud -- Compute Engine -- Virtual Machine Images -- Virtual Machines Are Contained in Projects -- Virtual Machines Run in a Zone and Region -- Users Need Privileges to Create Virtual Machines -- Preemptible Virtual Machines -- Custom Machine Types…”
Libro electrónico -
2282Publicado 2016Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Introduction -- Who this Book is for -- What this Book Covers -- How this Book is Structured -- What You Need to Use this Book -- Conventions -- Source Code -- Errata -- p2p.wrox.com -- Chapter 1 Getting Started with ASP.NET 6.0 -- An Introduction to ASP.NET vNext -- Hypertext Transfer Protocol (HTTP) -- Microsoft Internet Information Services -- HTML 5 -- HTML Markup -- Attributes in HTML -- HTML Example -- ASP.NET Web Forms -- ViewState -- ASP.NET Web Forms Events and Page Lifecycle -- Control Library -- ASP.NET MVC -- Testability -- Full Control over Output -- Web Forms and MVC Similarities -- Choosing the Best Approach -- Using Visual Studio 2015 -- Versions -- Downloading and Installing -- The Sample Application -- Summary -- Chapter 2 Building an Initial ASP.NET Application -- Creating Websites with Visual Studio 2015 -- Available Project Types -- Web Site Project-Based Approach -- Web Application Project -- Creating a New Site -- While Creating a Project -- Empty Template -- Web Forms Template -- MVC Template -- Web API Template -- Single Page Application Template -- Azure Mobile Service Template -- Working with Files in Your Application -- File Types of an ASP.NET MVC Application -- File System Structure of an ASP.NET MVC Application -- File Types of an ASP.NET Web Forms Application -- MVC and Web Form File Differences -- Creating the Sample Application -- Summary -- Chapter 3 Designing Your Web Pages -- HTML and CSS -- Why Use Both HTML and CSS? …”
Libro electrónico -
2283por Wesselius, JaapTabla de Contenidos: “…Managing Workloads for Individual Users -- Summary -- Part II: Office 365 Integration -- Chapter 4: Azure AD Identities -- Cloud Identities -- Synchronized Identities -- Federated Identities -- Azure AD Connect -- AD Connect Deployment -- AD Connect Health -- Chapter 5: Exchange Online -- Exchange Hybrid Topologies -- Deploying Exchange Hybrid -- Hybrid Configuration Wizard -- PowerShell: Connecting to Office 365 -- Connecting to Exchange Online -- Connecting to Azure Active Directory -- OAuth -- Autodiscover in Exchange Hybrid -- Mailbox Migration -- Managing Remote Mailboxes -- Federation with Azure Active Directory -- Sharing of Information -- Organizational Relationships -- Sharing Policies -- Internet Calendar Publishing -- Mail Transport -- Inbound Mail -- Centralized Mail Transport -- Outbound Mail -- Enhanced Filtering -- Exchange Online Archiving -- Message Tracking -- Recipient Management Only -- Summary -- Part III: Security -- Chapter 6: Publishing Exchange Server -- Virtual Directories -- Namespaces -- Split DNS -- Certificates -- Requesting Certificates -- Exporting Certificates -- Importing Certificates -- Autodiscover -- Domain-Joined Clients -- Non-Domain-Joined Clients -- Autodiscover Redirect -- Autodiscover SRV Records -- Autodiscover V2 -- Client Connectivity -- Outlook -- MAPI over HTTP -- Web-Based Clients -- Offline Settings -- Outlook Apps -- Exchange Admin Center -- Exchange Web Services -- REST API -- Mobile Clients -- IMAP and POP -- High Availability -- Load Balancing -- Health Check Monitors -- SSL Offloading -- Load Balancer Transparency -- Up-Level and Down-Level Proxying -- Azure AD Application Proxy -- Azure Front Door -- Chapter 7: Email Authentication -- Sender Policy Framework -- Constructing the SPF Record -- Checking the SPF Record -- DKIM -- Exchange and DKIM -- DKIM and Exchange Online Protection -- DMARC…”
Publicado 2023
Libro electrónico -
2284Publicado 2017Tabla de Contenidos: “…. -- How it works... -- Using the Stream API -- Getting started -- How to do it... -- How it works... -- Applying streams to collections -- Getting started -- How to do it... -- How it works... -- Applying streams to NIO 2.0 -- Getting started -- How to do it... -- How it works... -- Using parallel streams -- Getting started -- How to do it... -- How it works... -- Chapter 7: Reactive Programming -- Applying the observer design pattern using Reactive Streams -- Getting started -- How to do it... -- How it works... -- Creating Mono& -- lt -- T& -- gt -- and Flux& -- lt -- T& -- gt -- publishers -- Getting started -- How to do it... -- How it works... -- Implementing the Subscriber& -- lt -- T& -- gt -- interface -- Getting ready -- How to do it... -- How it works... -- Applying backpressure to Mono& -- lt -- T& -- gt -- and Flux& -- lt -- T& -- gt -- -- Getting ready -- How to do it... -- How it works... -- Managing task executions using Schedulers -- Getting ready -- How to do it... -- How it works... -- Creating concurrent and parallel emissions -- Getting ready -- How to do it... -- How it works... -- Managing continuous data emission -- Getting ready -- How to do it…”
Libro electrónico -
2285Publicado 2018Tabla de Contenidos: “…. -- How it works... -- Creating a GitHub API key -- Getting ready -- How to do it... -- How it works... -- See also -- Using GitHub to authenticate at Jenkins -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Triggering Jenkins builds -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using Jenkinsfiles -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Other Books You May Enjoy -- Index…”
Libro electrónico -
2286Publicado 2017Tabla de Contenidos: “…. -- See also -- Higher-level APIs-Keras -- How to do it... -- There's more... -- See also -- Chapter 4: Convolutional Neural Networks -- Introduction -- Local receptive fields -- Shared weights and bias -- A mathematical example -- ConvNets in TensorFlow -- Pooling layers -- Max pooling -- Average pooling -- ConvNets summary -- Creating a ConvNet to classify handwritten MNIST numbers -- Getting ready -- How to do it... -- How it works... -- Creating a ConvNet to classify CIFAR-10 -- Getting ready -- How to do it... -- How it works... -- There's more... -- Transferring style with VGG19 for image repainting -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using a pretrained VGG16 net for transfer learning -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating a DeepDream network -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 5: Advanced Convolutional Neural Networks -- Introduction -- Creating a ConvNet for Sentiment Analysis -- Getting ready -- How to do it... -- How it works... -- There is more... -- Inspecting what filters a VGG pre-built network has learned -- Getting ready -- How to do it... -- How it works... -- There is more…”
Libro electrónico -
2287Publicado 2017Tabla de Contenidos: “…Simplifying resource handling of legacy APIs with smart pointers…”
Libro electrónico -
2288Publicado 2017Tabla de Contenidos: “…. -- How it works... -- Stubbing external API calls with Sinon.JS -- Getting ready -- How to do it... -- How it works... -- Measuring the coverage of your code -- Getting ready -- How to do it... -- How it works... -- Chapter 8: Organize + Automate + Deploy = Webpack -- Introduction -- Extracting logic from your components to keep the code tidy -- Getting ready -- How to do it... -- Creating a clean Webpack project -- Building the compound interest calculator -- How it works... -- Bundling your component with Webpack -- Getting ready -- How to do it... -- How it works... -- There's more... -- Organizing your dependencies with Webpack -- Getting ready -- How to do it…”
Libro electrónico -
2289Publicado 2010Tabla de Contenidos: “…18.1 The Problem with Actions -- 18.2 Commands -- 18.3 Contributions -- 18.4 Handlers -- 18.5 Summary -- 18.6 Pointers -- Chapter 19 Customizing Workbench Windows -- 19.1 Customization Defined -- 19.2 Customizing a Workbench Window -- 19.3 Custom Window Shapes -- 19.4 Summary -- 19.5 Pointers -- Chapter 20 Customizing the Presentation of Views and Editors -- 20.1 Presentations -- 20.2 Sample Presentations -- 20.3 Writing a Presentation -- 20.4 Example Presentation -- 20.5 Summary -- 20.6 Pointers -- Part IV: Development Processes -- Chapter 21 Installing and Updating with p2 -- 21.1 The Roles of p2 -- 21.2 Architecture -- 21.3 Using the p2 API -- 21.4 Metadata Management -- 21.5 Repository Management -- 21.6 Installation Management -- 21.7 Summary -- 21.8 Pointers -- Chapter 22 Dynamic Plug-ins -- 22.1 Making Hyperbola Dynamic -- 22.2 Dynamic Challenges -- 22.3 Dynamic Awareness -- 22.4 Dynamic Enablement -- 22.5 Summary -- 22.6 Pointers -- Chapter 23 RCP Everywhere -- 23.1 Sample Code -- 23.2 The Scenario -- 23.3 Product Configurations -- 23.4 Hyperbola Product Configurations -- 23.5 Code Structure -- 23.6 Designing a Platform -- 23.7 RCP-Friendly Plug-ins -- 23.8 Summary -- 23.9 Pointers -- Chapter 24 Building Hyperbola -- 24.1 What Is PDE Build? …”
Libro electrónico -
2290Publicado 2018Tabla de Contenidos: “…Important plist files -- The HomeDomain plist files -- The RootDomain plist files -- The WirelessDomain plist files -- The SystemPreferencesDomain plist files -- Other important files -- Cookies -- Keyboard cache -- Photos -- Thumbnails -- Wallpaper -- Recordings -- Downloaded applications -- Apple Watch -- Recovering deleted SQLite records -- Summary -- Chapter 6: iOS Forensic Tools -- Working with Cellebrite UFED Physical Analyzer -- Features of Cellebrite UFED Physical Analyzer -- Advanced logical acquisition and analysis with Cellebrite UFED Physical Analyzer -- Working with Magnet AXIOM -- Features of Magnet AXIOM -- Logical acquisition and analysis with Magnet AXIOM -- Working with Belkasoft Evidence Center -- Features of Belkasoft Evidence Center -- iTunes backup parsing and analysis with Belkasoft Evidence Center -- Working with Oxygen Forensic Detective -- Features of Oxygen Forensic Detective -- Logical acquisition and analysis with Oxygen Forensic Detective -- Summary -- Chapter 7: Understanding Android -- The evolution of Android -- The Android model -- The Linux kernel layer -- The Hardware Abstraction Layer -- Libraries -- Dalvik virtual machine -- Android Runtime (ART) -- The Java API framework layer -- The system apps layer -- Android security -- Secure kernel -- The permission model -- Application sandbox -- Secure inter-process communication -- Application signing -- Security-Enhanced Linux -- Full Disk Encryption -- Trusted Execution Environment -- The Android file hierarchy -- The Android file system -- Viewing file systems on an Android device -- Common file systems found on Android -- Summary -- Chapter 8: Android Forensic Setup and Pre-Data Extraction Techniques -- Setting up the forensic environment for Android -- The Android Software Development Kit -- The Android SDK installation -- An Android Virtual Device…”
Libro electrónico -
2291por Schrenk, MichaelTabla de Contenidos: “…8: Image-Capturing Webbots -- Example Image-Capturing Webbot -- Creating the Image-Capturing Webbot -- Binary-Safe Download Routine -- Directory Structure -- The Main Script -- Further Exploration -- Final Thoughts -- 9: Link-Verification Webbots -- Creating the Link-Verification Webbot -- Initializing the Webbot and Downloading the Target -- Setting the Page Base -- Parsing the Links -- Running a Verification Loop -- Generating Fully Resolved URLs -- Downloading the Linked Page -- Displaying the Page Status -- Running the Webbot -- LIB_http_codes -- LIB_resolve_addresses -- Further Exploration -- 10: Anonymous Browsing Webbots -- Anonymity with Proxies -- Non-proxied Environments -- Your Online Exposure -- Proxied Environments -- The Anonymizer Project -- Writing the Anonymizer -- Final Thoughts -- 11: Search-Ranking Webbots -- Description of a Search Result Page -- What the Search-Ranking Webbot Does -- Running the Search-Ranking Webbot -- How the Search-Ranking Webbot Works -- The Search-Ranking Webbot Script -- Initializing Variables -- Starting the Loop -- Fetching the Search Results -- Parsing the Search Results -- Final Thoughts -- Be Kind to Your Sources -- Search Sites May Treat Webbots Differently Than Browsers -- Spidering Search Engines Is a Bad Idea -- Familiarize Yourself with the Google API -- Further Exploration -- 12: Aggregation Webbots -- Choosing Data Sources for Webbots -- Example Aggregation Webbot -- Familiarizing Yourself with RSS Feeds -- Writing the Aggregation Webbot -- Adding Filtering to Your Aggregation Webbot -- Further Exploration -- 13: FTP Webbots -- Example FTP Webbot -- PHP and FTP -- Further Exploration -- 14: NNTP News Webbots -- NNTP Use and History -- Webbots and Newsgroups -- Identifying News Servers -- Identifying Newsgroups -- Finding Articles in Newsgroups -- Reading an Article from a Newsgroup…”
Publicado 2007
Libro electrónico -
2292por Rodriguez, Juan R.Tabla de Contenidos: “…Location Aware Services application development -- 6.1 Developing a Location Aware Services portlet -- 6.1.1 Creating a Location Aware Services project -- 6.1.2 Testing the Location Aware Services portlet -- 6.1.3 Further enhancements -- 6.2 Deploying the Location Aware Services portlet -- 6.2.1 Deploying to a server with Location Aware Services installed -- 6.2.2 Deploying to a server without Location Aware Services -- 6.3 Location Aware Services Java application development -- 6.3.1 Summary of Java application development -- 6.4 Developing a Location Aware Services adapter -- 6.4.1 Location Aware Services Adapter coding -- 6.4.2 Registering the custom adapter -- 6.5 Location Aware Services API -- 6.6 Other sources of information…”
Publicado 2005
Libro electrónico -
2293Publicado 2003Tabla de Contenidos: “…J2EE programming model -- J2EE platform -- J2EE clients -- Web clients -- Hyper Text Transfer Protocol (HTTP) -- Hyper-Text Markup Language (HTML) -- eXtensible Markup Language (XML) -- JavaScript and document object model (DOM) -- Multipurpose Internet Mail Extensions (MIME) -- Application clients -- Web services -- J2EE roles -- J2EE application model and components -- J2EE application model -- Components -- Servlets -- Filters -- Life cycle events -- JavaServer Pages (JSPs) -- Enterprise JavaBeans (EJBs) -- Container-managed relationships (CMR) -- EJB query language (EJB QL) -- Local and remote interfaces -- J2EE packaging -- Containers -- Web container -- EJB container -- JCA container -- Application client container -- Applet container -- J2EE services -- Java Naming and Directory Interface (JNDI) -- Java Database Connectivity (JDBC) -- Java Transaction API (JTA) and Java Transaction Service (JTS) -- Isolation level -- Java Messaging Service (JMS) -- J2EE benefits -- WebSphere Application Server -- WebSphere versions -- WebSphere Application Server architecture…”
Libro electrónico -
2294Publicado 2010Tabla de Contenidos: “…Scheduler-Related System Calls -- Scheduling Policy and Priority-Related System Calls -- Processor Affinity System Calls -- Yielding Processor Time -- Conclusion -- 5 System Calls -- Communicating with the Kernel -- APIs, POSIX, and the C Library -- Syscalls -- System Call Numbers -- System Call Performance -- System Call Handler -- Denoting the Correct System Call -- Parameter Passing -- System Call Implementation -- Implementing System Calls -- Verifying the Parameters -- System Call Context -- Final Steps in Binding a System Call -- Accessing the System Call from User-Space -- Why Not to Implement a System Call -- Conclusion -- 6 Kernel Data Structures -- Linked Lists -- Singly and Doubly Linked Lists -- Circular Linked Lists -- Moving Through a Linked List -- The Linux Kernel's Implementation -- Manipulating Linked Lists -- Traversing Linked Lists -- Queues -- kfifo -- Creating a Queue -- Enqueuing Data -- Dequeuing Data -- Obtaining the Size of a Queue -- Resetting and Destroying the Queue -- Example Queue Usage -- Maps -- Initializing an idr -- Allocating a New UID -- Looking Up a UID -- Removing a UID -- Destroying an idr -- Binary Trees -- Binary Search Trees -- Self-Balancing Binary Search Trees -- What Data Structure to Use, When -- Algorithmic Complexity -- Algorithms -- Big-O Notation -- Big Theta Notation -- Time Complexity -- Conclusion -- 7 Interrupts and Interrupt Handlers -- Interrupts -- Interrupt Handlers -- Top Halves Versus Bottom Halves -- Registering an Interrupt Handler -- Interrupt Handler Flags -- An Interrupt Example -- Freeing an Interrupt Handler -- Writing an Interrupt Handler -- Shared Handlers -- A Real-Life Interrupt Handler -- Interrupt Context -- Implementing Interrupt Handlers -- /proc/interrupts -- Interrupt Control -- Disabling and Enabling Interrupts -- Disabling a Specific Interrupt Line…”
Libro electrónico -
2295Publicado 2017Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Dedication -- Table of Contents -- Preface -- Chapter 1: Introduction to Pentaho Reporting -- Introducing Pentaho Reporting -- Introducing Pentaho Reporting tools -- Types of users and required knowledge -- Technological advantages -- A business friendly open source license -- Typical uses of Pentaho Reporting -- Operational reporting -- Business intelligence reporting -- Financial reporting -- Production reporting -- Pentaho Reporting history -- Feature overview -- An advanced reporting algorithm -- A multitude of available data sources -- A wide variety of output formats -- Pixel accurate rich formatting -- Embedded charts -- Report parameterization -- Formulas and style expressions -- Subreports -- Cross tab reports -- Interactive reporting -- Rich authoring tools -- Reporting server -- Java API for building reports -- Extensibility -- Pentaho reporting website -- Pentaho Reporting architecture -- Reporting Engine's libraries -- Reporting Engine core -- Reporting Engine extensions -- Summary -- Chapter 2: Getting Started with Report Designer -- Prerequisites of your environment -- Setting up the Pentaho Report Designer -- The SamplaData& -- #160 -- schema -- Introduction to& -- #160 -- the user interface -- Menu and toolbar -- Report element palette -- Report canvas tab -- Report explorer -- Element properties -- Messages -- Creating your first report using the wizard -- Introducing& -- #160 -- the Report Design Wizard -- Defining the look and feel -- Defining the data source and query -- Defining the layout -- Formatting the fields -- Previewing the report -- Saving and opening the report -- Summary -- Chapter 3: Getting Started with Reporting SDK -- Obtaining& -- #160 -- the Pentaho Reporting SDK…”
Libro electrónico -
2296Publicado 2018Tabla de Contenidos: “…. -- Building your own SMS sending service with the REST API -- Getting ready -- REST server -- Mobile sending application -- How it works... -- There's more... -- Chapter 9: Using specific platform features -- Introduction…”
Libro electrónico -
2297Publicado 2017Tabla de Contenidos: “…. -- Performance first delivery -- Removing picturefill polyfill -- See also -- Chapter 6: Creating Forms with the Form API -- Introduction -- Creating a form -- Getting ready -- How to do it... -- How it works... -- There's more... -- Form element definitions -- The form state -- The form cache -- See also -- Using new HTML5 elements -- Getting ready -- How to do it... -- How it works... -- There's more... -- Specific element properties -- Creating new elements -- See also -- Validating form data -- Getting ready -- How to do it... -- How it works... -- There's more... -- Multiple validation handlers -- Accessing multidimensional array values -- Element validation methods -- Processing submitted form data -- Getting ready -- How to do it... -- How it works... -- There's more... -- Multiple submit handlers -- See also -- Altering other forms -- Getting ready -- How to do it... -- How it works... -- There's more…”
Libro electrónico -
2298Publicado 2011Tabla de Contenidos: “…-- Java Virtual Machine -- Features of Java -- Small -- Simple -- Object Oriented -- Compiled and Interpreted -- Platform Independent -- Robust and Secure -- Multithreaded -- Dynamic -- Java's Evolution -- JDK 1.0 (January 23, 1996): Codename Oak -- JDK 1.1 (February 19, 1997) -- Java Beans -- Remote Method Invocation -- The JAR File Format -- Digital Signatures -- AWT Enhancements -- Other Changes -- J2SE 1.2 (December 8, 1998): Codename Playground -- The Introduction of Swing -- The 2D API -- Drag-and-Drop -- Audio Enhancements -- Java IDL -- Security Enhancements -- Other Enhancements -- J2SE 1.3 (May 8, 2000): Codename Kestrel -- J2SE 1.4 (Feb 6, 2002): Codename Merlin -- J2SE 5.0 (Sept 30, 2004): Codename Tiger -- Java SE 6 (Dec 11, 2006): Codename Mustang -- Java SE 7 (July 7, 2011): Codename Dolphin -- Summary -- Chapter 2: Arrays -- Arrays -- Declaring Arrays -- Creating Arrays -- Accessing and Modifying Array Elements -- Initializing Arrays -- Initializing at Runtime -- Initializing Using Array Literals -- The for-each Loop -- Multidimensional Arrays -- Two-dimensional Arrays -- Initializing Two-dimensional Arrays -- Initializing at Runtime -- Initializing Using Array Literals -- Looping Using the for-each Construct -- N-dimensional Arrays -- Nonrectangular Arrays -- Runtime Initialization -- Initialization Using Array Literals -- A Few Goodies -- Determining the Array Length -- Cloning an Array -- Finding Out the Class of an Array -- Summary -- Chapter 3: Classes -- Object-Oriented Programming (OOP) Concepts -- OOP Features -- Encapsulation -- Inheritance -- Polymorphism -- OOP Benefits -- The Class -- Defining a Class…”
Libro electrónico -
2299Publicado 2022Tabla de Contenidos: “…-- Learning to avoid fakes -- Submitting forms using spies -- Untangling AAA -- Making a reusable spy function -- Using a matcher to simplify spy expectations -- Spying on the fetch API -- Replacing global functions with spies -- Test-driving fetch argument values -- Reworking existing tests with the side-by-side implementation -- Improving spy expectations with helper functions -- Stubbing fetch responses -- Upgrading spies to stubs -- Acting on the fetch response -- Displaying errors to the user -- Grouping stub scenarios in nested describe contexts -- Migrating to Jest's built-in test double support -- Using Jest to spy and stub -- Migrating the test suite to use Jest's test double support -- Extracting fetch test functionality -- Summary -- Exercises -- Further reading -- Chapter 7: Testing useEffect and Mocking Components -- Technical requirements -- Mocking child components -- How to mock components, and why? …”
Libro electrónico -
2300Publicado 2022Tabla de Contenidos: “…Deploying a container to ACI with a CI/CD pipeline -- Writing the Terraform code for ACI -- Creating a CI/CD pipeline for the container -- Using Docker for running command-line tools -- Getting started with Docker Compose -- Installing Docker Compose -- Writing the Docker Compose configuration file -- Executing Docker Compose -- Deploying Docker Compose containers in ACI -- Summary -- Questions -- Further reading -- Chapter 10: Managing Containers Effectively with Kubernetes -- Technical requirements -- Installing Kubernetes -- Kubernetes architecture overview -- Installing Kubernetes on a local machine -- Installing the Kubernetes dashboard -- A first example of Kubernetes application deployment -- Using Helm as a package manager -- Installing the Helm client -- Using a public Helm chart from Artifact Hub -- Creating a custom Helm chart -- Publishing a Helm chart in a private registry (ACR) -- Using AKS -- Creating an AKS service -- Configuring the kubeconfig file for AKS -- Advantages of AKS -- Creating a CI/CD pipeline for Kubernetes with Azure Pipelines -- Monitoring applications and metrics in Kubernetes -- Using the kubectl command line -- Using the web dashboard -- Using tier tools -- Summary -- Questions -- Further reading -- Section 4: Testing Your Application -- Chapter 11: Testing APIs with Postman -- Technical requirements -- Creating a Postman collection with requests -- Installation of Postman -- Creating a collection -- Creating our first request -- Using environments and variables to dynamize requests -- Writing Postman tests -- Executing Postman request tests locally -- Understanding the Newman concept -- Preparing Postman collections for Newman -- Exporting the collection -- Exporting the environments -- Running the Newman command line -- Integration of Newman in the CI/CD pipeline process -- Build and release configuration…”
Libro electrónico