Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Història 49
- Development 25
- Historia 17
- Application software 16
- Canaris, Wilhelm 15
- Derecho mercantil 14
- Código 13
- Congressos 12
- Cloud computing 11
- Església Catòlica 11
- Canarias 10
- Computer software 9
- Història eclesiàstica 9
- Itinera 9
- Derecho urbanístico 8
- Legislació 8
- Canary Islands 7
- Guerra mundial, 1939-1945 7
- Biografia 6
- Canàries 6
- Descripcions i viatges 6
- Management 6
- Research & information: general 6
- Turisme 6
- Web applications 6
- Application program interfaces (Computer software) 5
- Aspectes socials 5
- Botànica 5
- Electronic data processing 5
- History 5
-
481por Calcote, LeeTabla de Contenidos: “…Ausgehender Datenverkehr - Egress -- Kapitel 9: Mixer und Richtlinien im Mesh -- Architektur -- Richtlinien durchsetzen -- Die Arbeitsweise von Mixer-Richtlinien -- Telemetriedaten berichten -- Attribute -- Berichte senden -- Überprüfungscaches -- Adapter -- In-Process-Adapter -- Out-of-Process-Adapter -- Eine Mixer-Richtlinie erstellen und Adapter verwenden -- Mixer-Konfiguration -- Open-Policy-Agent-Adapter -- Prometheus-Adapter -- Kapitel 10: Telemetrie -- Adaptermodelle -- Telemetriedaten melden -- Metriken -- Mixer konfigurieren, um Metriken zu sammeln -- Eine Metriken-Sammlung einrichten und Metriken abfragen -- Traces -- Tracing deaktivieren -- Protokolle -- Metriken -- Visualisierung -- Kapitel 11: Istio debuggen -- Introspektion von Istio-Komponenten -- Troubleshooting mit einer Management Plane -- Von kubectl profitieren -- Auf Workloads vorbereitet sein -- Anwendungskonfiguration -- Netzwerkverkehr und Ports -- Services und Deployments -- Pods -- Installation, Upgrade und Deinstallation von Istio -- Installation -- Upgrade -- Deinstallation -- Troubleshooting von Mixer -- Troubleshooting von Pilot -- Debugging von Galley -- Debugging von Envoy -- Die Verwaltungskonsole von Envoy -- Anfragen mit dem Statuscode 503 oder 404 -- Sidecar Injection -- Versionskompatibilität -- Kapitel 12: Deployment von Anwendungen in der Praxis -- Betrachtungen zur Control Plane -- Galley -- Pilot -- Mixer -- Citadel -- Fallstudie: Canary-Deployment -- Clusterübergreifende Deployments -- Kapitel 13: Erweiterte Szenarios -- Arten von erweiterten Topologien -- Einzelcluster-Meshes -- Multicluster-Meshes -- Anwendungsfälle -- Eine Topologie auswählen -- Clusterübergreifend oder Multicluster? …”
Publicado 2020
Libro electrónico -
482Publicado 2024Tabla de Contenidos: “…Using Kotlin coroutines for network calls -- Summary -- Chapter 7: Navigating within Your App -- Technical requirements -- Jetpack Navigation overview -- Navigating to Compose destinations -- Passing arguments to destinations -- Navigation in foldables and large screens -- Creating and using the resizable emulator -- Summary -- Chapter 8: Persisting Data Locally and Doing Background Work -- Technical requirements -- Saving and reading data from a local database -- Handling updates and migrations in the Room database -- Using WorkManager to schedule background tasks -- Testing your workers -- Summary -- Chapter 9: Runtime Permissions -- Technical requirements -- Understanding runtime permissions -- Requesting permissions at runtime -- Summary -- Part 3: Code Analysis and Tests -- Chapter 10: Debugging Your App -- Technical requirements -- General debugging tips and tricks -- Logcat -- Stack traces -- Breakpoints -- Detecting memory leaks with LeakCanary -- Inspecting network requests with Chucker -- Using App Inspection -- Summary -- Chapter 11: Enhancing Code Quality -- Technical requirements -- Mastering Kotlin style and best practices -- Coding conventions -- Null safety -- Data classes -- Extensions functions -- Type inference -- Collections -- Sealed classes and interfaces -- Formatting -- Functional programming -- Coroutines -- The when statements -- Classes and functions -- Using Ktlint for static analysis -- Detecting code smells with detekt -- Setting up detekt -- Customizing detekt -- Summary -- Chapter 12: Testing Your App -- Technical requirements -- Importance of testing -- Testing the network and database layers -- Testing the network layer -- Testing the database layer -- Testing our ViewModels -- Adding UI tests to our composables -- Summary -- Part 4: Publishing Your App -- Chapter 13: Publishing Your App -- Technical requirements…”
Libro electrónico -
483Publicado 2024Tabla de Contenidos: “…Deep diving into GitHub workflow structure -- GitHub Actions best practices -- Deployment strategies -- Blue-green deployment -- Rolling deployment -- Canary deployment -- Feature release strategies -- Feature flag -- Release train -- Summary -- Further reading -- Part 3: Beyond DevOps -- Chapter 6: Enriching DevOps Implementation -- Leveraging metrics in DevOps -- Four keys - DORA metrics -- SPACE framework -- Metrics at GitHub -- DevSecOps - Security as a continuous matter -- Security shift-left -- Security features in GitHub -- Scaling the collaboration -- Why scaling collaboration is imperative -- InnerSource - Distributed collaboration model -- Setting up GitHub for scalable collaboration -- Summary -- Further reading -- Chapter 7: Accelerate Productivity with AI -- AI innovation in coding -- The impact of LLMs on coding -- Understanding LLMs - A basic introduction -- Application of LLMs in coding -- Prompt and context -- Exploring the capabilities and interaction with AI in coding -- Code completion - The foundation of AI-powered coding -- Code explanation -- Strategies for maximizing AI efficiency -- Be specific -- Be context-aware -- Be consistent -- Summary -- Further reading -- Chapter 8: Reflection and Conclusion -- Reflecting on the journey through Git, GitHub, and DevOps - Enhancing the developer experience -- Embracing AI in development - The next evolutionary step in software engineering -- Concluding remarks -- Index -- Other Books You May Enjoy…”
Libro electrónico -
484Publicado 2024Tabla de Contenidos: “…Calling Assembly from Python -- Summary -- Exercises -- Chapter 10: Multiply and Divide -- Multiplication -- Examples -- Division -- Division by Zero and Overflow -- Example -- Example: Matrix Multiplication -- Vectors and Matrices -- Multiplying 3x3 Integer Matrices -- Accessing Matrix Elements -- Register Usage -- Summary -- Exercises -- Chapter 11: Floating-Point Operations -- About Floating Point Numbers -- About Normalization and NaNs -- Recognizing Rounding Errors -- Defining Floating Point Numbers -- About Floating Point Registers -- The Status and Control Register -- Defining the Function Call Protocol -- Loading and Saving FPU Registers -- Performing Basic Arithmetic -- Calculating Distance Between Points -- Performing Floating-Point Conversions -- Floating-Point Sign Injection -- Comparing Floating-Point Numbers -- Example -- Summary -- Exercises -- Chapter 12: Optimizing Code -- Optimizing the Uppercase Routine -- Simplifying the Range Comparison -- Restricting the Problem Domain -- Tips for Optimizing Code -- Avoiding Branch Instructions -- Moving Code Out of Loops -- Avoiding Expensive Instructions -- Use Macros -- Loop Unrolling -- Delay Preserving Registers in Functions -- Keeping Data Small -- Beware of Overheating -- Summary -- Exercises -- Chapter 13: Reading and Understanding Code -- Browsing Linux & -- GCC Code -- Comparing Strings -- About the Algorithm -- Macros and Kernel Options -- Code Created by GCC -- Reverse Engineering and Ghidra -- Summary -- Exercises -- Chapter 14: Hacking Code -- Buffer Overrun Hack -- Causes of Buffer Overrun -- Stealing Credit Card Numbers -- Stepping Through the Stack -- Mitigating Buffer Overrun Vulnerabilities -- Do Not Use strcpy -- PIE Is Good -- Poor Stack Canaries Are the First to Go -- Preventing Code Running on the Stack -- Tradeoffs of Buffer Overflow Mitigation Techniques -- Summary…”
Libro electrónico -
485Publicado 2018Tabla de Contenidos: “…SQL Injection -- Text-Encoding Character Replacement -- Final Words -- Chapter 10: Finding and Exploiting Security Vulnerabilities -- Fuzz Testing -- The Simplest Fuzz Test -- Mutation Fuzzer -- Generating Test Cases -- Vulnerability Triaging -- Debugging Applications -- Improving Your Chances of Finding the Root Cause of a Crash -- Exploiting Common Vulnerabilities -- Exploiting Memory Corruption Vulnerabilities -- Arbitrary Memory Write Vulnerability -- Writing Shell Code -- Getting Started -- Simple Debugging Technique -- Calling System Calls -- Executing the Other Programs -- Generating Shell Code with Metasploit -- Memory Corruption Exploit Mitigations -- Data Execution Prevention -- Return-Oriented Programming Counter-Exploit -- Address Space Layout Randomization (ASLR) -- Detecting Stack Overflows with Memory Canaries -- Final Words -- Appendix: Network Protocol Analysis Toolkit -- Passive Network Protocol Capture and Analysis Tools -- Microsoft Message Analyzer -- TCPDump and LibPCAP -- Wireshark -- Active Network Capture and Analysis -- Canape -- Canape Core -- Mallory -- Network Connectivity and Protocol Testing -- Hping -- Netcat -- Nmap -- Web Application Testing -- Burp Suite -- Zed Attack Proxy (ZAP) -- Mitmproxy -- Fuzzing, Packet Generation, and Vulnerability Exploitation Frameworks -- American Fuzzy Lop (AFL) -- Kali Linux -- Metasploit Framework -- Scapy -- Sulley -- Network Spoofing and Redirection -- DNSMasq -- Ettercap -- Executable Reverse Engineering -- Java Decompiler (JD) -- IDA Pro -- Hopper -- ILSpy -- .NET Reflector -- Index -- Footnotes -- Chapter 2: Capturing Application Traffic -- Chapter 3: Network Protocol Structures -- Chapter 6: Application Reverse Engineering…”
Libro electrónico -
486Publicado 2020Tabla de Contenidos: “…-- Proxy-Optionen -- Protokolle wechseln -- Beispiel: FTP -- Beispiel: Message Interception -- Andere Protokolle -- Andere Beispiele für das Strangler Fig Pattern -- Verhaltensänderung während der Migration -- Pattern: UI Composition -- Beispiel: Page Composition -- Beispiel: Widget Composition -- Beispiel: Micro Frontends -- Wo wir es einsetzen -- Pattern: Branch by Abstraction -- Wie es funktioniert -- Als Fallback-Mechanismus -- Wo wir es einsetzen -- Pattern: Parallel Run -- Beispiel: Preisbildung von Kreditderivaten -- Beispiel: Homegate-Angebote -- Verifikationstechniken -- Spione einsetzen -- Scientist von GitHub -- Dark Launching und Canary Releasing -- Wo wir es einsetzen -- Pattern: Decorating Collaborator -- Beispiel: Loyalty-Programm -- Wo wir es einsetzen -- Pattern: Change Data Capture -- Beispiel: Loyalty-Karten ausgeben -- Change Data Capture implementieren -- Wo wir es einsetzen -- Zusammenfassung -- Kapitel 4: Die Datenbank aufteilen -- Pattern: Shared Database -- Hilfreiche Patterns -- Wo wir es einsetzen…”
Libro electrónico -
487Publicado 2009Tabla de Contenidos: “…Un projecte fotogràfic / Adrià Goula -- Intervencions en l'oblit: Club Méditerranée, Cap de Creus / Sílvia Musquera, Pep Canaleta, 3carme33 -- Canàries, turisme i ficció / BASA -- Activar la participació social per requalificar els paisatges: Can Ricart (Poble Nou, Barcelona): de la cadena industrial a la xarxa d'idees / Associació Nau21 -- Servei d'Interpretació Territorial / Elvira Pujol -- Projecte Dorve: projecte participatiu per a la definició del model de comaraca per al Pallars Sobirà. …”
Libro -
488Publicado 2023Tabla de Contenidos: “…-- Shadow deployment strategy -- A/B testing model deployment strategy -- Canary deployment strategy -- Succeeding in AI - how well-managed AI companies do infrastructure right -- The promise of AI - where is AI taking us? …”
Libro electrónico -
489Publicado 2017Tabla de Contenidos: “…. -- How it works... -- See also -- Canary deployment via DNS -- Getting ready -- How to do it... -- How it works... -- Hosting a domain -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also... -- Routing based on location with failover -- Getting ready -- How to do it... -- How it works... -- Normal operation (geolocation routing) -- Region A failure -- Region B failure -- There's more... -- See also... -- Network logging and troubleshooting -- Getting ready -- How to do it... -- How it works... -- There's more... -- Log format -- Updates -- Omissions -- See also -- Chapter 8: Security and Identity -- Introduction -- Federating with your AWS account -- Getting ready -- How to do it... -- Active Directory configuration -- Auth Account policy configuration -- Auth Account role configuration -- Simple AD configuration -- App Account role configuration -- How it works... -- There's more... -- See also -- Creating SSL certificates -- How to do it... -- How it works... -- There's more... -- EC2 instances -- Importing certificates -- CloudFormation -- Active Directory as a service -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Creating users -- Getting ready -- How to do it... -- There's more... -- See also -- Creating instance roles -- How to do it…”
Libro electrónico -
490por Powell, Ken, 1947-Tabla de Contenidos: “…Conté (Volum 3): Richard Rogers Partnership Today; An up-date survey, p.6; Research Centres: VR Techno Plaza, Amano Research Laboratories, Gifu, 1993-1999, p.18; Learning Resource Centre, Thames Valley University, Slough, 1993-1996, p.32; ParcBIT, Mallorca, 1994- , p.36; South Bank Centre, London, 1994-1997, p.40; Montevetro, London, 1994-2000, p.48; Saitama Arena, Omiya City, 1995, p.56; Urban Masterplanning: Piana di Castelo, Scandicci, Florence, 1995, p.62; Minamiyamashiro Elementary School, Kyoto, 1995-2003, p.66; Pusan High-speed Rail Station, Pusan, 1996, p.78; Greenwich Peninsula Masterplan and Millennium Dome, London, 1996-1999, p.82; Ashford Retail Outlet Centre, Kent, 1996-2000, p.96; Terminal Building, Barajas Airport, Madrid, 1997-2005, p.108; Antwerp Law Courts, Antwerp, 1998-2005, p.130; Viareggio Masterplan, Viareggio, 1999, p.146; Chiswick Park, London, 1999-2004, p.152; A Political Career: The impact of Richard Rogers, p.162; Paddington Basin, London, 1999-2004, p.172; National Assembly for Wales, Cardiff, 1999-2005, p.184; National Graduate Institute for Policy Studies, Roppongi, 1999-2005, p.192; Hesperia Hotel, L’Hospitalet, Catalonia, 1999-2006, p.196; Terminal 5, Heathrow Airport, London, 1999-2008, p.200; Robert Bosch Villa, Stuttgart, 2000, p.212; Canary Wharf, Riverside South, London, 200o-, p.214; Barcelona Bullring, Barcelona, 2000-2008, p.218; Sagaponac House, Long Island, 2001-, p.224; Silvertown Docks, London, 2001, p.226; Three Towers: Torre Espacio, Nexity Tower, Mutua Tower, Madrid, 2001, p.230; Business Park and Hotel, Barcelona, 2001, p.238; Maggie’s Centre, London, 2001-2006, p.242; Law Courts, Barcelona and L’Hospitalet, 2002, p.244; Congress and Cultural Centre, Sabadell, 2002, p.248; Convoys Wharf, London, 2002-, p.252; Fourth Grace, Liverpool, 2002, p.256; 122 Leadenhall Street, London, 2002-, p.260; Library of Birmingham and City Park Gate, Birmingham, 2002, p.270; Mossbourne Community Academy, London, 2002-2004, p.278; Wembley Masterplan, London, 2003-, p.286; Terminal 2, Pudong Airport, Shanghai, 2003, p.288: The Way Forward: The practice in the future, p.296…”
Publicado 1999
Libro -
491Publicado 2021Tabla de Contenidos: “…The network is homogeneous -- CAP theorem and eventual consistency -- Sagas and compensating transactions -- Choreography-based sagas -- Orchestration-based sagas -- Making your system fault tolerant and available -- Calculating your system's availability -- Building fault-tolerant systems -- Redundancy -- Leader election -- Consensus -- Replication -- Master-slave replication -- Multi-master replication -- Queue-based load leveling -- Back pressure -- Detecting faults -- Sidecar design pattern -- Heartbeat mechanism -- Leaky bucket counter -- Minimizing the impact of faults -- Retrying the call -- Avoiding cascading failures -- Circuit breaker -- Bulkhead -- Geodes -- Integrating your system -- Pipes and filters pattern -- Competing consumers -- Transitioning from legacy systems -- Anti-corruption layer -- Strangler pattern -- Achieving performance at scale -- CQRS and event sourcing -- Command-query responsibility segregation -- Command-query separation -- Event sourcing -- Caching -- Updating caches -- Write-through approach -- Write-behind approach -- Cache-aside -- Deploying your system -- The sidecar pattern -- Deploying a service with tracing and a reverse proxy using Envoy -- Zero-downtime deployments -- Blue-green deployments -- Canary releases -- External configuration store -- Managing your APIs -- API gateways -- Summary -- Questions -- Further reading -- Chapter 5: Leveraging C++ Language Features -- Technical requirements -- Designing great APIs -- Leveraging RAII -- Specifying the interfaces of containers in C++ -- Using pointers in interfaces -- Specifying preconditions and postconditions -- Leveraging inline namespaces -- Leveraging std::optional -- Optional function parameters -- Optional function return values -- Optional class members -- Writing declarative code -- Showcasing a featured items gallery -- Introducing standard ranges…”
Libro electrónico -
492Publicado 2023Tabla de Contenidos: “…-- In practice - applying what you've learned -- Preparing AWS for the lab -- Creating your repository -- Adding secrets to your repository -- Downloading and committing the lab files -- Understanding the pipeline -- Adding more steps -- Testing but not deploying -- Lab final thoughts -- Summary -- Chapter 11: Worker Bees - Orchestrations of Serverless, Containers, and Kubernetes -- Technical requirements -- The multiple definitions of serverless -- Serverless Framework -- Serverless computing -- Serverless functions -- Monitoring serverless functions -- Errors -- Containers and why we love them -- Isolation -- Immutability -- Promotability -- Tagging -- Rollbacks -- Security -- Signable -- Monitoring containers -- Kubernetes and other ways to orchestrate containers -- Health checks -- Crashing and force-closing containers -- HTTP-based load balancing -- Server load balancing -- Containers as a Service (CaaS) -- Simple container orchestration -- Kubernetes -- Deployment techniques and workers -- Traditional replacement deployment -- Rolling deployment -- A/B or blue/green deployment -- Canary deployment -- Automation and rolling back failed deployments -- Rollback metrics -- When to roll back -- How to roll back…”
Libro electrónico -
493Publicado 2018Tabla de Contenidos: “…Starting Nexpose -- Start a scan -- Exploitation -- Post-exploitation -- Infrastructure analysis -- Pillaging -- High-profile targets -- Data exfiltration -- Persistence -- Further penetration into infrastructure -- Cleanup -- Reporting -- Executive summary -- Technical report -- Penetration testing limitations and challenges -- Pentesting maturity and scoring model -- Realism -- Methodology -- Reporting -- Summary -- Chapter 2: Advanced Linux Exploitation -- Linux basics -- Linux commands -- Streams -- Redirection -- Linux directory structure -- Users and groups -- Permissions -- The chmod command -- The chown command -- The chroot command -- The power of the find command -- Jobs, cron, and crontab -- Security models -- Security controls -- Access control models -- Linux attack vectors -- Linux enumeration with LinEnum -- OS detection with Nmap -- Privilege escalation -- Linux privilege checker -- Linux kernel exploitation -- UserLand versus kernel land -- System calls -- Linux kernel subsystems -- Process -- Threads -- Security-Enhanced Linux -- Memory models and the address spaces -- Linux kernel vulnerabilities -- NULL pointer dereference -- Arbitrary kernel read/write -- Case study CVE-2016-2443 Qualcomm MSM debug fs kernel arbitrary write -- Memory corruption vulnerabilities -- Kernel stack vulnerabilities -- Kernel heap vulnerabilities -- Race conditions -- Logical and hardware-related bugs -- Case study CVE-2016-4484 - Cryptsetup Initrd root Shell -- Linux Exploit Suggester -- Buffer overflow prevention techniques -- Address space layout randomization -- Stack canaries -- Non-executable stack -- Linux return oriented programming -- Linux hardening -- Summary -- Chapter 3: Corporate Network and Database Exploitation -- Networking fundamentals -- Network topologies -- Bus topology -- Star topology -- Ring topology -- Tree topology…”
Libro electrónico -
494Publicado 2023Tabla de Contenidos: “…-- The tasks of an orchestrator -- Reconciling the desired state -- Replicated and global services -- Service discovery -- Routing -- Load balancing -- Scaling -- Self-healing -- Data persistence and storage management -- Zero downtime deployments -- Affinity and location awareness -- Security -- Introspection -- Overview of popular orchestrators -- Kubernetes -- Docker Swarm -- Apache Mesos and Marathon -- Amazon ECS -- AWS EKS -- Microsoft ACS and AKS -- Summary -- Further reading -- Questions -- Answers -- Chapter 14: Introducing Docker Swarm -- The Docker Swarm architecture -- Swarm nodes -- Stacks, services, and tasks -- Services -- Tasks -- Stacks -- Multi-host networking -- Creating a Docker Swarm -- Creating a local single-node swarm -- Using PWD to generate a Swarm -- Creating a Docker Swarm in the cloud -- Deploying a first application -- Creating a service -- Inspecting the service and its tasks -- Testing the load balancing -- Logs of a service -- Reconciling the desired state -- Deleting a service or a stack -- Deploying a multi-service stack -- Removing the swarm in AWS -- Summary -- Questions -- Answers -- Chapter 15: Deploying and Running a Distributed Application on Docker Swarm -- The swarm routing mesh -- Zero-downtime deployment -- Popular deployment strategies -- Rolling updates -- Health checks -- Rolling back -- Blue-green deployments -- Canary releases -- Storing configuration data in the swarm…”
Libro electrónico -
495Publicado 2019Tabla de Contenidos: “…-- Performance testing -- Continuous Testing -- Chapter 11 Deploying a Product -- Releasing Code -- Integrating and Delivering Continuously -- Benefitting from CI/CD -- Implementing CI/CD -- Managing Deployments -- Automating the right way -- Versioning -- Mitigating Failure -- Rolling back -- Fixing forward -- Democratizing Deployments -- Choosing a Deployment Style -- Blue-green: Not just for lakes -- Schrodinger's canary: The deploy's not dead (or is it?) -- Rolling the dice -- Toggling with feature flags -- Monitoring Your Systems -- Understanding telemetry -- Recording behavior -- SLAs, SLIs, and SLOs -- Part 3 Connecting the Circuit -- Chapter 12 Implementing Rapid Iteration -- Prioritizing the Important -- Important and urgent -- Important, not urgent -- Urgent, not important -- Neither important nor urgent -- Increasing Velocity -- Improving Performance -- Eliminating perfection -- Designing small teams -- Tracking your work -- Reducing friction -- Humanizing alerting -- Chapter 13 Creating Feedback Loops around the Customer -- Creating a Customer Feedback Process -- Creating a Feedback Loop -- Receive -- Analyze -- Communicate -- Change -- Collecting Feedback -- Satisfaction surveys -- Case studies -- Dogfooding -- Asking for Continual Feedback -- Net promoter score (NPS) -- Finding a rhythm…”
Libro electrónico -
496Publicado 2022Tabla de Contenidos: “…Varying animation behavior -- Summary -- Exercises -- Chapter 16: Working with WebSockets -- Technical requirements -- Designing a WebSocket interaction -- The sharing workflow -- The new UI elements -- Splitting apart the saga -- Test-driving a WebSocket connection -- Streaming events with redux-saga -- Updating the app -- Summary -- Exercises -- Further reading -- Part 4 - Behavior-Driven Development with Cucumber -- Chapter 17: Writing Your First Cucumber Test -- Technical requirements -- Integrating Cucumber and Puppeteer into your code base -- Writing your first Cucumber test -- Using data tables to perform setup -- Summary -- Chapter 18: Adding Features Guided by Cucumber Tests -- Technical requirements -- Adding Cucumber tests for a dialog box -- Fixing Cucumber tests by test-driving production code -- Adding a dialog box -- Updating sagas to a reset or replay state -- Avoiding timeouts in test code -- Adding HTML classes to mark animation status -- Updating step definitions to use waitForSelector -- Summary -- Exercise -- Chapter 19: Understanding TDD in the Wider Testing Landscape -- Test-driven development as a testing technique -- Best practices for your unit tests -- Improving your technique -- Manual testing -- Demonstrating software -- Testing the whole product -- Exploratory testing -- Debugging in the browser -- Automated testing -- Integration tests -- System tests and end-to-end tests -- Acceptance tests -- Property-based and generative testing -- Snapshot testing -- Canary testing -- Not testing at all -- When quality doesn't matter -- Spiking and deleting code -- Summary -- Further reading -- Index -- Other Books You May Enjoy…”
Libro electrónico -
497Publicado 2022Tabla de Contenidos: “…The pipeline execution -- Summary -- Questions -- Further reading -- Chapter 12: Static Code Analysis with SonarQube -- Technical requirements -- Exploring SonarQube -- Installing SonarQube -- Overview of the SonarQube architecture -- SonarQube installation -- Real-time analysis with SonarLint -- Executing SonarQube in a CI process -- Configuring SonarQube -- Creating a CI pipeline for SonarQube in Azure Pipelines -- Summary -- Questions -- Further reading -- Chapter 13: Security and Performance Tests -- Technical requirements -- Applying web security and penetration testing with ZAP -- Using ZAP for security testing -- Ways to automate the execution of ZAP -- Running performance tests with Postman -- Summary -- Questions -- Further reading -- Section 5: Taking DevOps Further/More on DevOps -- Chapter 14: Security in the DevOps Process with DevSecOps -- Technical requirements -- Testing Azure infrastructure compliance with Chef InSpec -- Overview of InSpec -- Installing InSpec -- Configuring Azure for InSpec -- Writing InSpec tests -- Executing InSpec -- Keeping sensitive data safe with HashiCorp Vault -- Installing Vault locally -- Starting the Vault server -- Writing secrets to Vault -- Reading secrets in Vault -- Using the Vault UI web interface -- Getting Vault secrets in Terraform -- Summary -- Questions -- Further reading -- Chapter 15: Reducing Deployment Downtime -- Technical requirements -- Reducing deployment downtime with Terraform -- Understanding blue-green deployment concepts and patterns -- Using blue-green deployment to improve the production environment -- Understanding the canary release pattern -- Exploring the dark launch pattern -- Applying blue-green deployments on Azure -- Using App Service with slots -- Using Azure Traffic Manager -- Introducing feature flags -- Using an open source framework for feature flags…”
Libro electrónico -
498Publicado 2024Tabla de Contenidos: “…Saga choreography pattern -- Saga orchestration pattern -- The Competing Consumers pattern -- Benefits of implementing the Competing Consumers pattern -- Circuit Breaker pattern -- Circuit Breaker states -- Anypoint MQ -- Message exchanges and queues -- Cross-region failover for Anypoint MQ standard queues -- Dead-letter queues -- The Circuit Breaker pattern with Anypoint MQ -- Event-driven architecture (EDA) -- Benefits of EDA -- Limitations of EDA -- API-led connectivity and EDA together -- Experience API -- Process API -- System API -- Application networks and composability -- Summary -- Chapter 8: Non-Functional Requirements Influence in Shaping the API Architecture -- Common non-functional requirements -- Meeting performance requirements in the platform -- Response time -- Throughput -- Error rates -- Availability -- Latency -- Scalability -- Resource allocation -- Performance testing -- Performance monitoring -- Load balancing -- Application caching -- API security -- Data security in motion or in transit -- Data security at rest -- Deployment strategies -- Rolling update deployment -- Blue-green deployment -- Canary deployment -- Summary -- Further reading -- Chapter 9: Hassle-free Deployment with Anypoint iPaaS (CloudHub 1.0) -- Technical requirements -- What is CloudHub 1.0? …”
Libro electrónico -
499Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: The Domain Name Ecosystem -- Why domains are important -- Domain names 101 -- Anatomy of a domain name -- Registry details -- Registrar WHOIS server -- Expiry date -- The registrant contact set -- The administrative contact set -- Use a domain you control -- Use a different domain than the name in the record -- Use an exploder -- Use a unique address -- Alternatively, use canaries -- The tech contact set -- The billing contact set -- DNS details -- Status -- Status flags set by the registry -- Ok -- inactive -- autoRenewPeriod -- pendingTransfer -- redemptionPeriod -- pendingDelete -- Status Flags set by the Registrar -- clientHold -- clientDeleteProhibited -- clientTransferProhibited -- clientUpdateProhibited -- clientRenewProhibited -- Understanding the domain name expiry cycle -- Domain expires (day 0) -- Domain gets parked (days 3 to 5-ish) -- RGP - Registrant Grace Period (up to 45 days) -- Redemption period (day 45-ish) -- PendingDelete - day 90 (5 days) -- Never do this -- What to do if you lose a key domain -- Summary -- References -- Chapter 2: Registries, Registrars, and Whois -- Registries and Registrars -- Generic TLDs -- Country Code TLDs (ccTLDs) -- New Top-Level Domains -- IDN TLDs -- Online tools for converting punycode -- Infrastructure TLDs -- Registrars and Resellers -- An effective Registrar should... -- What is Whois? …”
Libro electrónico -
500por Filer, Colin“…This book explores the idea that small island communities could be regarded as canaries in the coal mine of sustainable development…”
Publicado 2024
Libro electrónico