Mostrando 481 - 500 Resultados de 610 Para Buscar '"cañari"', tiempo de consulta: 0.12s Limitar resultados
  1. 481
    por Calcote, Lee
    Publicado 2020
    Tabla de Contenidos: “…Ausgehender Datenverkehr - Egress -- Kapitel 9: Mixer und Richtlinien im Mesh -- Architektur -- Richtlinien durchsetzen -- Die Arbeitsweise von Mixer-Richtlinien -- Telemetriedaten berichten -- Attribute -- Berichte senden -- Überprüfungscaches -- Adapter -- In-Process-Adapter -- Out-of-Process-Adapter -- Eine Mixer-Richtlinie erstellen und Adapter verwenden -- Mixer-Konfiguration -- Open-Policy-Agent-Adapter -- Prometheus-Adapter -- Kapitel 10: Telemetrie -- Adaptermodelle -- Telemetriedaten melden -- Metriken -- Mixer konfigurieren, um Metriken zu sammeln -- Eine Metriken-Sammlung einrichten und Metriken abfragen -- Traces -- Tracing deaktivieren -- Protokolle -- Metriken -- Visualisierung -- Kapitel 11: Istio debuggen -- Introspektion von Istio-Komponenten -- Troubleshooting mit einer Management Plane -- Von kubectl profitieren -- Auf Workloads vorbereitet sein -- Anwendungskonfiguration -- Netzwerkverkehr und Ports -- Services und Deployments -- Pods -- Installation, Upgrade und Deinstallation von Istio -- Installation -- Upgrade -- Deinstallation -- Troubleshooting von Mixer -- Troubleshooting von Pilot -- Debugging von Galley -- Debugging von Envoy -- Die Verwaltungskonsole von Envoy -- Anfragen mit dem Statuscode 503 oder 404 -- Sidecar Injection -- Versionskompatibilität -- Kapitel 12: Deployment von Anwendungen in der Praxis -- Betrachtungen zur Control Plane -- Galley -- Pilot -- Mixer -- Citadel -- Fallstudie: Canary-Deployment -- Clusterübergreifende Deployments -- Kapitel 13: Erweiterte Szenarios -- Arten von erweiterten Topologien -- Einzelcluster-Meshes -- Multicluster-Meshes -- Anwendungsfälle -- Eine Topologie auswählen -- Clusterübergreifend oder Multicluster? …”
    Libro electrónico
  2. 482
    Publicado 2024
    Tabla de Contenidos: “…Using Kotlin coroutines for network calls -- Summary -- Chapter 7: Navigating within Your App -- Technical requirements -- Jetpack Navigation overview -- Navigating to Compose destinations -- Passing arguments to destinations -- Navigation in foldables and large screens -- Creating and using the resizable emulator -- Summary -- Chapter 8: Persisting Data Locally and Doing Background Work -- Technical requirements -- Saving and reading data from a local database -- Handling updates and migrations in the Room database -- Using WorkManager to schedule background tasks -- Testing your workers -- Summary -- Chapter 9: Runtime Permissions -- Technical requirements -- Understanding runtime permissions -- Requesting permissions at runtime -- Summary -- Part 3: Code Analysis and Tests -- Chapter 10: Debugging Your App -- Technical requirements -- General debugging tips and tricks -- Logcat -- Stack traces -- Breakpoints -- Detecting memory leaks with LeakCanary -- Inspecting network requests with Chucker -- Using App Inspection -- Summary -- Chapter 11: Enhancing Code Quality -- Technical requirements -- Mastering Kotlin style and best practices -- Coding conventions -- Null safety -- Data classes -- Extensions functions -- Type inference -- Collections -- Sealed classes and interfaces -- Formatting -- Functional programming -- Coroutines -- The when statements -- Classes and functions -- Using Ktlint for static analysis -- Detecting code smells with detekt -- Setting up detekt -- Customizing detekt -- Summary -- Chapter 12: Testing Your App -- Technical requirements -- Importance of testing -- Testing the network and database layers -- Testing the network layer -- Testing the database layer -- Testing our ViewModels -- Adding UI tests to our composables -- Summary -- Part 4: Publishing Your App -- Chapter 13: Publishing Your App -- Technical requirements…”
    Libro electrónico
  3. 483
    Publicado 2024
    Tabla de Contenidos: “…Deep diving into GitHub workflow structure -- GitHub Actions best practices -- Deployment strategies -- Blue-green deployment -- Rolling deployment -- Canary deployment -- Feature release strategies -- Feature flag -- Release train -- Summary -- Further reading -- Part 3: Beyond DevOps -- Chapter 6: Enriching DevOps Implementation -- Leveraging metrics in DevOps -- Four keys - DORA metrics -- SPACE framework -- Metrics at GitHub -- DevSecOps - Security as a continuous matter -- Security shift-left -- Security features in GitHub -- Scaling the collaboration -- Why scaling collaboration is imperative -- InnerSource - Distributed collaboration model -- Setting up GitHub for scalable collaboration -- Summary -- Further reading -- Chapter 7: Accelerate Productivity with AI -- AI innovation in coding -- The impact of LLMs on coding -- Understanding LLMs - A basic introduction -- Application of LLMs in coding -- Prompt and context -- Exploring the capabilities and interaction with AI in coding -- Code completion - The foundation of AI-powered coding -- Code explanation -- Strategies for maximizing AI efficiency -- Be specific -- Be context-aware -- Be consistent -- Summary -- Further reading -- Chapter 8: Reflection and Conclusion -- Reflecting on the journey through Git, GitHub, and DevOps - Enhancing the developer experience -- Embracing AI in development - The next evolutionary step in software engineering -- Concluding remarks -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  4. 484
    Publicado 2024
    Tabla de Contenidos: “…Calling Assembly from Python -- Summary -- Exercises -- Chapter 10: Multiply and Divide -- Multiplication -- Examples -- Division -- Division by Zero and Overflow -- Example -- Example: Matrix Multiplication -- Vectors and Matrices -- Multiplying 3x3 Integer Matrices -- Accessing Matrix Elements -- Register Usage -- Summary -- Exercises -- Chapter 11: Floating-Point Operations -- About Floating Point Numbers -- About Normalization and NaNs -- Recognizing Rounding Errors -- Defining Floating Point Numbers -- About Floating Point Registers -- The Status and Control Register -- Defining the Function Call Protocol -- Loading and Saving FPU Registers -- Performing Basic Arithmetic -- Calculating Distance Between Points -- Performing Floating-Point Conversions -- Floating-Point Sign Injection -- Comparing Floating-Point Numbers -- Example -- Summary -- Exercises -- Chapter 12: Optimizing Code -- Optimizing the Uppercase Routine -- Simplifying the Range Comparison -- Restricting the Problem Domain -- Tips for Optimizing Code -- Avoiding Branch Instructions -- Moving Code Out of Loops -- Avoiding Expensive Instructions -- Use Macros -- Loop Unrolling -- Delay Preserving Registers in Functions -- Keeping Data Small -- Beware of Overheating -- Summary -- Exercises -- Chapter 13: Reading and Understanding Code -- Browsing Linux &amp -- GCC Code -- Comparing Strings -- About the Algorithm -- Macros and Kernel Options -- Code Created by GCC -- Reverse Engineering and Ghidra -- Summary -- Exercises -- Chapter 14: Hacking Code -- Buffer Overrun Hack -- Causes of Buffer Overrun -- Stealing Credit Card Numbers -- Stepping Through the Stack -- Mitigating Buffer Overrun Vulnerabilities -- Do Not Use strcpy -- PIE Is Good -- Poor Stack Canaries Are the First to Go -- Preventing Code Running on the Stack -- Tradeoffs of Buffer Overflow Mitigation Techniques -- Summary…”
    Libro electrónico
  5. 485
    Publicado 2018
    Tabla de Contenidos: “…SQL Injection -- Text-Encoding Character Replacement -- Final Words -- Chapter 10: Finding and Exploiting Security Vulnerabilities -- Fuzz Testing -- The Simplest Fuzz Test -- Mutation Fuzzer -- Generating Test Cases -- Vulnerability Triaging -- Debugging Applications -- Improving Your Chances of Finding the Root Cause of a Crash -- Exploiting Common Vulnerabilities -- Exploiting Memory Corruption Vulnerabilities -- Arbitrary Memory Write Vulnerability -- Writing Shell Code -- Getting Started -- Simple Debugging Technique -- Calling System Calls -- Executing the Other Programs -- Generating Shell Code with Metasploit -- Memory Corruption Exploit Mitigations -- Data Execution Prevention -- Return-Oriented Programming Counter-Exploit -- Address Space Layout Randomization (ASLR) -- Detecting Stack Overflows with Memory Canaries -- Final Words -- Appendix: Network Protocol Analysis Toolkit -- Passive Network Protocol Capture and Analysis Tools -- Microsoft Message Analyzer -- TCPDump and LibPCAP -- Wireshark -- Active Network Capture and Analysis -- Canape -- Canape Core -- Mallory -- Network Connectivity and Protocol Testing -- Hping -- Netcat -- Nmap -- Web Application Testing -- Burp Suite -- Zed Attack Proxy (ZAP) -- Mitmproxy -- Fuzzing, Packet Generation, and Vulnerability Exploitation Frameworks -- American Fuzzy Lop (AFL) -- Kali Linux -- Metasploit Framework -- Scapy -- Sulley -- Network Spoofing and Redirection -- DNSMasq -- Ettercap -- Executable Reverse Engineering -- Java Decompiler (JD) -- IDA Pro -- Hopper -- ILSpy -- .NET Reflector -- Index -- Footnotes -- Chapter 2: Capturing Application Traffic -- Chapter 3: Network Protocol Structures -- Chapter 6: Application Reverse Engineering…”
    Libro electrónico
  6. 486
    Publicado 2020
    Tabla de Contenidos: “…-- Proxy-Optionen -- Protokolle wechseln -- Beispiel: FTP -- Beispiel: Message Interception -- Andere Protokolle -- Andere Beispiele für das Strangler Fig Pattern -- Verhaltensänderung während der Migration -- Pattern: UI Composition -- Beispiel: Page Composition -- Beispiel: Widget Composition -- Beispiel: Micro Frontends -- Wo wir es einsetzen -- Pattern: Branch by Abstraction -- Wie es funktioniert -- Als Fallback-Mechanismus -- Wo wir es einsetzen -- Pattern: Parallel Run -- Beispiel: Preisbildung von Kreditderivaten -- Beispiel: Homegate-Angebote -- Verifikationstechniken -- Spione einsetzen -- Scientist von GitHub -- Dark Launching und Canary Releasing -- Wo wir es einsetzen -- Pattern: Decorating Collaborator -- Beispiel: Loyalty-Programm -- Wo wir es einsetzen -- Pattern: Change Data Capture -- Beispiel: Loyalty-Karten ausgeben -- Change Data Capture implementieren -- Wo wir es einsetzen -- Zusammenfassung -- Kapitel 4: Die Datenbank aufteilen -- Pattern: Shared Database -- Hilfreiche Patterns -- Wo wir es einsetzen…”
    Libro electrónico
  7. 487
    Publicado 2009
    Tabla de Contenidos: “…Un projecte fotogràfic / Adrià Goula -- Intervencions en l'oblit: Club Méditerranée, Cap de Creus / Sílvia Musquera, Pep Canaleta, 3carme33 -- Canàries, turisme i ficció / BASA -- Activar la participació social per requalificar els paisatges: Can Ricart (Poble Nou, Barcelona): de la cadena industrial a la xarxa d'idees / Associació Nau21 -- Servei d'Interpretació Territorial / Elvira Pujol -- Projecte Dorve: projecte participatiu per a la definició del model de comaraca per al Pallars Sobirà. …”
    Libro
  8. 488
    Publicado 2023
    Tabla de Contenidos: “…-- Shadow deployment strategy -- A/B testing model deployment strategy -- Canary deployment strategy -- Succeeding in AI - how well-managed AI companies do infrastructure right -- The promise of AI - where is AI taking us? …”
    Libro electrónico
  9. 489
    Publicado 2017
    Tabla de Contenidos: “…. -- How it works... -- See also -- Canary deployment via DNS -- Getting ready -- How to do it... -- How it works... -- Hosting a domain -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also... -- Routing based on location with failover -- Getting ready -- How to do it... -- How it works... -- Normal operation (geolocation routing) -- Region A failure -- Region B failure -- There's more... -- See also... -- Network logging and troubleshooting -- Getting ready -- How to do it... -- How it works... -- There's more... -- Log format -- Updates -- Omissions -- See also -- Chapter 8: Security and Identity -- Introduction -- Federating with your AWS account -- Getting ready -- How to do it... -- Active Directory configuration -- Auth Account policy configuration -- Auth Account role configuration -- Simple AD configuration -- App Account role configuration -- How it works... -- There's more... -- See also -- Creating SSL certificates -- How to do it... -- How it works... -- There's more... -- EC2 instances -- Importing certificates -- CloudFormation -- Active Directory as a service -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Creating users -- Getting ready -- How to do it... -- There's more... -- See also -- Creating instance roles -- How to do it…”
    Libro electrónico
  10. 490
    por Powell, Ken, 1947-
    Publicado 1999
    Tabla de Contenidos: “…Conté (Volum 3): Richard Rogers Partnership Today; An up-date survey, p.6; Research Centres: VR Techno Plaza, Amano Research Laboratories, Gifu, 1993-1999, p.18; Learning Resource Centre, Thames Valley University, Slough, 1993-1996, p.32; ParcBIT, Mallorca, 1994- , p.36; South Bank Centre, London, 1994-1997, p.40; Montevetro, London, 1994-2000, p.48; Saitama Arena, Omiya City, 1995, p.56; Urban Masterplanning: Piana di Castelo, Scandicci, Florence, 1995, p.62; Minamiyamashiro Elementary School, Kyoto, 1995-2003, p.66; Pusan High-speed Rail Station, Pusan, 1996, p.78; Greenwich Peninsula Masterplan and Millennium Dome, London, 1996-1999, p.82; Ashford Retail Outlet Centre, Kent, 1996-2000, p.96; Terminal Building, Barajas Airport, Madrid, 1997-2005, p.108; Antwerp Law Courts, Antwerp, 1998-2005, p.130; Viareggio Masterplan, Viareggio, 1999, p.146; Chiswick Park, London, 1999-2004, p.152; A Political Career: The impact of Richard Rogers, p.162; Paddington Basin, London, 1999-2004, p.172; National Assembly for Wales, Cardiff, 1999-2005, p.184; National Graduate Institute for Policy Studies, Roppongi, 1999-2005, p.192; Hesperia Hotel, L’Hospitalet, Catalonia, 1999-2006, p.196; Terminal 5, Heathrow Airport, London, 1999-2008, p.200; Robert Bosch Villa, Stuttgart, 2000, p.212; Canary Wharf, Riverside South, London, 200o-, p.214; Barcelona Bullring, Barcelona, 2000-2008, p.218; Sagaponac House, Long Island, 2001-, p.224; Silvertown Docks, London, 2001, p.226; Three Towers: Torre Espacio, Nexity Tower, Mutua Tower, Madrid, 2001, p.230; Business Park and Hotel, Barcelona, 2001, p.238; Maggie’s Centre, London, 2001-2006, p.242; Law Courts, Barcelona and L’Hospitalet, 2002, p.244; Congress and Cultural Centre, Sabadell, 2002, p.248; Convoys Wharf, London, 2002-, p.252; Fourth Grace, Liverpool, 2002, p.256; 122 Leadenhall Street, London, 2002-, p.260; Library of Birmingham and City Park Gate, Birmingham, 2002, p.270; Mossbourne Community Academy, London, 2002-2004, p.278; Wembley Masterplan, London, 2003-, p.286; Terminal 2, Pudong Airport, Shanghai, 2003, p.288: The Way Forward: The practice in the future, p.296…”
    Libro
  11. 491
    Publicado 2021
    Tabla de Contenidos: “…The network is homogeneous -- CAP theorem and eventual consistency -- Sagas and compensating transactions -- Choreography-based sagas -- Orchestration-based sagas -- Making your system fault tolerant and available -- Calculating your system's availability -- Building fault-tolerant systems -- Redundancy -- Leader election -- Consensus -- Replication -- Master-slave replication -- Multi-master replication -- Queue-based load leveling -- Back pressure -- Detecting faults -- Sidecar design pattern -- Heartbeat mechanism -- Leaky bucket counter -- Minimizing the impact of faults -- Retrying the call -- Avoiding cascading failures -- Circuit breaker -- Bulkhead -- Geodes -- Integrating your system -- Pipes and filters pattern -- Competing consumers -- Transitioning from legacy systems -- Anti-corruption layer -- Strangler pattern -- Achieving performance at scale -- CQRS and event sourcing -- Command-query responsibility segregation -- Command-query separation -- Event sourcing -- Caching -- Updating caches -- Write-through approach -- Write-behind approach -- Cache-aside -- Deploying your system -- The sidecar pattern -- Deploying a service with tracing and a reverse proxy using Envoy -- Zero-downtime deployments -- Blue-green deployments -- Canary releases -- External configuration store -- Managing your APIs -- API gateways -- Summary -- Questions -- Further reading -- Chapter 5: Leveraging C++ Language Features -- Technical requirements -- Designing great APIs -- Leveraging RAII -- Specifying the interfaces of containers in C++ -- Using pointers in interfaces -- Specifying preconditions and postconditions -- Leveraging inline namespaces -- Leveraging std::optional -- Optional function parameters -- Optional function return values -- Optional class members -- Writing declarative code -- Showcasing a featured items gallery -- Introducing standard ranges…”
    Libro electrónico
  12. 492
    Publicado 2023
    Tabla de Contenidos: “…-- In practice - applying what you've learned -- Preparing AWS for the lab -- Creating your repository -- Adding secrets to your repository -- Downloading and committing the lab files -- Understanding the pipeline -- Adding more steps -- Testing but not deploying -- Lab final thoughts -- Summary -- Chapter 11: Worker Bees - Orchestrations of Serverless, Containers, and Kubernetes -- Technical requirements -- The multiple definitions of serverless -- Serverless Framework -- Serverless computing -- Serverless functions -- Monitoring serverless functions -- Errors -- Containers and why we love them -- Isolation -- Immutability -- Promotability -- Tagging -- Rollbacks -- Security -- Signable -- Monitoring containers -- Kubernetes and other ways to orchestrate containers -- Health checks -- Crashing and force-closing containers -- HTTP-based load balancing -- Server load balancing -- Containers as a Service (CaaS) -- Simple container orchestration -- Kubernetes -- Deployment techniques and workers -- Traditional replacement deployment -- Rolling deployment -- A/B or blue/green deployment -- Canary deployment -- Automation and rolling back failed deployments -- Rollback metrics -- When to roll back -- How to roll back…”
    Libro electrónico
  13. 493
    Publicado 2018
    Tabla de Contenidos: “…Starting Nexpose -- Start a scan -- Exploitation -- Post-exploitation -- Infrastructure analysis -- Pillaging -- High-profile targets -- Data exfiltration -- Persistence -- Further penetration into infrastructure -- Cleanup -- Reporting -- Executive summary -- Technical report -- Penetration testing limitations and challenges -- Pentesting maturity and scoring model -- Realism -- Methodology -- Reporting -- Summary -- Chapter 2: Advanced Linux Exploitation -- Linux basics -- Linux commands -- Streams -- Redirection -- Linux directory structure -- Users and groups -- Permissions -- The chmod command -- The chown command -- The chroot command -- The power of the find command -- Jobs, cron, and crontab -- Security models -- Security controls -- Access control models -- Linux attack vectors -- Linux enumeration with LinEnum -- OS detection with Nmap -- Privilege escalation -- Linux privilege checker -- Linux kernel exploitation -- UserLand versus kernel land -- System calls -- Linux kernel subsystems -- Process -- Threads -- Security-Enhanced Linux -- Memory models and the address spaces -- Linux kernel vulnerabilities -- NULL pointer dereference -- Arbitrary kernel read/write -- Case study CVE-2016-2443 Qualcomm MSM debug fs kernel arbitrary write -- Memory corruption vulnerabilities -- Kernel stack vulnerabilities -- Kernel heap vulnerabilities -- Race conditions -- Logical and hardware-related bugs -- Case study CVE-2016-4484 - Cryptsetup Initrd root Shell -- Linux Exploit Suggester -- Buffer overflow prevention techniques -- Address space layout randomization -- Stack canaries -- Non-executable stack -- Linux return oriented programming -- Linux hardening -- Summary -- Chapter 3: Corporate Network and Database Exploitation -- Networking fundamentals -- Network topologies -- Bus topology -- Star topology -- Ring topology -- Tree topology…”
    Libro electrónico
  14. 494
    Publicado 2023
    Tabla de Contenidos: “…-- The tasks of an orchestrator -- Reconciling the desired state -- Replicated and global services -- Service discovery -- Routing -- Load balancing -- Scaling -- Self-healing -- Data persistence and storage management -- Zero downtime deployments -- Affinity and location awareness -- Security -- Introspection -- Overview of popular orchestrators -- Kubernetes -- Docker Swarm -- Apache Mesos and Marathon -- Amazon ECS -- AWS EKS -- Microsoft ACS and AKS -- Summary -- Further reading -- Questions -- Answers -- Chapter 14: Introducing Docker Swarm -- The Docker Swarm architecture -- Swarm nodes -- Stacks, services, and tasks -- Services -- Tasks -- Stacks -- Multi-host networking -- Creating a Docker Swarm -- Creating a local single-node swarm -- Using PWD to generate a Swarm -- Creating a Docker Swarm in the cloud -- Deploying a first application -- Creating a service -- Inspecting the service and its tasks -- Testing the load balancing -- Logs of a service -- Reconciling the desired state -- Deleting a service or a stack -- Deploying a multi-service stack -- Removing the swarm in AWS -- Summary -- Questions -- Answers -- Chapter 15: Deploying and Running a Distributed Application on Docker Swarm -- The swarm routing mesh -- Zero-downtime deployment -- Popular deployment strategies -- Rolling updates -- Health checks -- Rolling back -- Blue-green deployments -- Canary releases -- Storing configuration data in the swarm…”
    Libro electrónico
  15. 495
    Publicado 2019
    Tabla de Contenidos: “…-- Performance testing -- Continuous Testing -- Chapter 11 Deploying a Product -- Releasing Code -- Integrating and Delivering Continuously -- Benefitting from CI/CD -- Implementing CI/CD -- Managing Deployments -- Automating the right way -- Versioning -- Mitigating Failure -- Rolling back -- Fixing forward -- Democratizing Deployments -- Choosing a Deployment Style -- Blue-green: Not just for lakes -- Schrodinger's canary: The deploy's not dead (or is it?) -- Rolling the dice -- Toggling with feature flags -- Monitoring Your Systems -- Understanding telemetry -- Recording behavior -- SLAs, SLIs, and SLOs -- Part 3 Connecting the Circuit -- Chapter 12 Implementing Rapid Iteration -- Prioritizing the Important -- Important and urgent -- Important, not urgent -- Urgent, not important -- Neither important nor urgent -- Increasing Velocity -- Improving Performance -- Eliminating perfection -- Designing small teams -- Tracking your work -- Reducing friction -- Humanizing alerting -- Chapter 13 Creating Feedback Loops around the Customer -- Creating a Customer Feedback Process -- Creating a Feedback Loop -- Receive -- Analyze -- Communicate -- Change -- Collecting Feedback -- Satisfaction surveys -- Case studies -- Dogfooding -- Asking for Continual Feedback -- Net promoter score (NPS) -- Finding a rhythm…”
    Libro electrónico
  16. 496
    Publicado 2022
    Tabla de Contenidos: “…Varying animation behavior -- Summary -- Exercises -- Chapter 16: Working with WebSockets -- Technical requirements -- Designing a WebSocket interaction -- The sharing workflow -- The new UI elements -- Splitting apart the saga -- Test-driving a WebSocket connection -- Streaming events with redux-saga -- Updating the app -- Summary -- Exercises -- Further reading -- Part 4 - Behavior-Driven Development with Cucumber -- Chapter 17: Writing Your First Cucumber Test -- Technical requirements -- Integrating Cucumber and Puppeteer into your code base -- Writing your first Cucumber test -- Using data tables to perform setup -- Summary -- Chapter 18: Adding Features Guided by Cucumber Tests -- Technical requirements -- Adding Cucumber tests for a dialog box -- Fixing Cucumber tests by test-driving production code -- Adding a dialog box -- Updating sagas to a reset or replay state -- Avoiding timeouts in test code -- Adding HTML classes to mark animation status -- Updating step definitions to use waitForSelector -- Summary -- Exercise -- Chapter 19: Understanding TDD in the Wider Testing Landscape -- Test-driven development as a testing technique -- Best practices for your unit tests -- Improving your technique -- Manual testing -- Demonstrating software -- Testing the whole product -- Exploratory testing -- Debugging in the browser -- Automated testing -- Integration tests -- System tests and end-to-end tests -- Acceptance tests -- Property-based and generative testing -- Snapshot testing -- Canary testing -- Not testing at all -- When quality doesn't matter -- Spiking and deleting code -- Summary -- Further reading -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  17. 497
    Publicado 2022
    Tabla de Contenidos: “…The pipeline execution -- Summary -- Questions -- Further reading -- Chapter 12: Static Code Analysis with SonarQube -- Technical requirements -- Exploring SonarQube -- Installing SonarQube -- Overview of the SonarQube architecture -- SonarQube installation -- Real-time analysis with SonarLint -- Executing SonarQube in a CI process -- Configuring SonarQube -- Creating a CI pipeline for SonarQube in Azure Pipelines -- Summary -- Questions -- Further reading -- Chapter 13: Security and Performance Tests -- Technical requirements -- Applying web security and penetration testing with ZAP -- Using ZAP for security testing -- Ways to automate the execution of ZAP -- Running performance tests with Postman -- Summary -- Questions -- Further reading -- Section 5: Taking DevOps Further/More on DevOps -- Chapter 14: Security in the DevOps Process with DevSecOps -- Technical requirements -- Testing Azure infrastructure compliance with Chef InSpec -- Overview of InSpec -- Installing InSpec -- Configuring Azure for InSpec -- Writing InSpec tests -- Executing InSpec -- Keeping sensitive data safe with HashiCorp Vault -- Installing Vault locally -- Starting the Vault server -- Writing secrets to Vault -- Reading secrets in Vault -- Using the Vault UI web interface -- Getting Vault secrets in Terraform -- Summary -- Questions -- Further reading -- Chapter 15: Reducing Deployment Downtime -- Technical requirements -- Reducing deployment downtime with Terraform -- Understanding blue-green deployment concepts and patterns -- Using blue-green deployment to improve the production environment -- Understanding the canary release pattern -- Exploring the dark launch pattern -- Applying blue-green deployments on Azure -- Using App Service with slots -- Using Azure Traffic Manager -- Introducing feature flags -- Using an open source framework for feature flags…”
    Libro electrónico
  18. 498
    Publicado 2024
    Tabla de Contenidos: “…Saga choreography pattern -- Saga orchestration pattern -- The Competing Consumers pattern -- Benefits of implementing the Competing Consumers pattern -- Circuit Breaker pattern -- Circuit Breaker states -- Anypoint MQ -- Message exchanges and queues -- Cross-region failover for Anypoint MQ standard queues -- Dead-letter queues -- The Circuit Breaker pattern with Anypoint MQ -- Event-driven architecture (EDA) -- Benefits of EDA -- Limitations of EDA -- API-led connectivity and EDA together -- Experience API -- Process API -- System API -- Application networks and composability -- Summary -- Chapter 8: Non-Functional Requirements Influence in Shaping the API Architecture -- Common non-functional requirements -- Meeting performance requirements in the platform -- Response time -- Throughput -- Error rates -- Availability -- Latency -- Scalability -- Resource allocation -- Performance testing -- Performance monitoring -- Load balancing -- Application caching -- API security -- Data security in motion or in transit -- Data security at rest -- Deployment strategies -- Rolling update deployment -- Blue-green deployment -- Canary deployment -- Summary -- Further reading -- Chapter 9: Hassle-free Deployment with Anypoint iPaaS (CloudHub 1.0) -- Technical requirements -- What is CloudHub 1.0? …”
    Libro electrónico
  19. 499
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: The Domain Name Ecosystem -- Why domains are important -- Domain names 101 -- Anatomy of a domain name -- Registry details -- Registrar WHOIS server -- Expiry date -- The registrant contact set -- The administrative contact set -- Use a domain you control -- Use a different domain than the name in the record -- Use an exploder -- Use a unique address -- Alternatively, use canaries -- The tech contact set -- The billing contact set -- DNS details -- Status -- Status flags set by the registry -- Ok -- inactive -- autoRenewPeriod -- pendingTransfer -- redemptionPeriod -- pendingDelete -- Status Flags set by the Registrar -- clientHold -- clientDeleteProhibited -- clientTransferProhibited -- clientUpdateProhibited -- clientRenewProhibited -- Understanding the domain name expiry cycle -- Domain expires (day 0) -- Domain gets parked (days 3 to 5-ish) -- RGP - Registrant Grace Period (up to 45 days) -- Redemption period (day 45-ish) -- PendingDelete - day 90 (5 days) -- Never do this -- What to do if you lose a key domain -- Summary -- References -- Chapter 2: Registries, Registrars, and Whois -- Registries and Registrars -- Generic TLDs -- Country Code TLDs (ccTLDs) -- New Top-Level Domains -- IDN TLDs -- Online tools for converting punycode -- Infrastructure TLDs -- Registrars and Resellers -- An effective Registrar should... -- What is Whois? …”
    Libro electrónico
  20. 500
    por Filer, Colin
    Publicado 2024
    “…This book explores the idea that small island communities could be regarded as canaries in the coal mine of sustainable development…”
    Libro electrónico