Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    ISBN: 9780134218229 , 0134218221
    Sprache: Englisch
    Seiten: 1 online resource (1 volume) , illustrations.
    Serie: Addison-Wesley Microsoft technology series
    Schlagwort(e): Windows Azure ; Application software ; Development ; Cloud computing ; Electronic books ; Electronic books ; local
    Kurzfassung: "Beyond just describing the basics, this book dives into best practices every aspiring microservices developer or architect should know." -Foreword by Corey Sanders, Partner Director of Program Management, Azure Microservice-based applications enable unprecedented agility and ease of management, and Docker containers are ideal for building them. Microsoft Azure offers all the foundational technology and higher-level services you need to develop and run any microservices application. Microservices with Docker on Microsoft Azure brings together essential knowledge for creating these applications from the ground up, or incrementally deconstructing monolithic applications over time. The authors draw on their pioneering experience helping to develop Azure's microservices features and collaborating with Microsoft product teams who've relied on microservices architectures for years. They illuminate the benefits and challenges of microservices development and share best practices all developers and architects should know. You'll gain hands-on expertise through a detailed sample application, downloadable at github.com/flakio/flakio.github.io. Step by step, you'll walk through working with services written in Node.js, Go, and ASP.NET 5, using diverse data stores (mysql, elasticsearch, block storage). The authors guide you through using Docker Hub as a service registry, and Microsoft Azure Container service for cluster management and service orchestration. Coverage includes: Recognizing how microservices architectures are different, and when they make sense Understanding Docker containers in the context of microservices architectures Building, pulling, and layering Docker images Working with Docker volumes, containers, images, tags, and logs Using Docker Swarm, Docker Compose, and Docker Networks Creating Docker hosts using the Azure portal, Azure Resource Manager, the command line, docker-machine, or locally via Docker toolbox Establishing development and DevOps environments to support microservices applications Making the most of Docker's continuous delivery options Using Azure's cluster and container orchestration capabilities to operate and scale containerized microservices applications with maximum resilience Monitoring microservices applications with Azure Diagnostics, Visual Studio Application Insights, and Microsoft Operations Management Suite Developing microservices applications faster and more effectively with Azure Service Fabric An extensiv...
    Anmerkung: Includes index. - Description based on online resource; title from title page (Safari, viewed September 2, 2016)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    ISBN: 9781264268955 , 1264268955
    Sprache: Englisch
    Seiten: 1 online resource
    Ausgabe: Sixth edition.
    Paralleltitel: Erscheint auch als
    DDC: 005.8
    Schlagwort(e): Computer security ; Hackers ; Computer Security ; Sécurité informatique ; Pirates informatiques ; Computer security ; Hackers ; Electronic books
    Kurzfassung: Up-to-date strategies for thwarting the latest, most insidious network attacks This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks. Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition clearly explains the enemy's devious weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. You will get complete coverage of Internet of Things, mobile, and Cloud security along with penetration testing, malware analysis, and reverse engineering techniques. State-of-the-art malware, ransomware, and system exploits are thoroughly explained. Fully revised content includes 7 new chapters covering the latest threats Includes proof-of-concept code stored on the GitHub repository Authors train attendees at major security conferences, including RSA, Black Hat, Defcon, and Besides.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...