Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Design, build, and deploy performant and maintainable web applications using Spring, Spring Boot, and AngularKey Features:- Find solutions to common problems faced while developing applications with Angular and Spring Boot- Explore tips, tricks, and best practices to overcome challenges related to source code- Build applications faster and more efficiently using the Spring Framework and the Spring Boot extensionBook Description:Angular makes building applications with the web easy and Spring Boot helps get an application up and running using just a few lines of code and minimal configuration. This book provides insights into building full-stack apps using Angular and Spring Boot effectively to reduce overall development time and increase efficiency.You'll start by setting up your CI/CD pipeline and then build your web application's backend guided by best practices. You'll then see how Spring Boot allows you to build applications faster and more efficiently by letting the Spring Framework and Spring Boot extension do the heavy lifting. The book demonstrates how to use Spring Data JPA and add its dependencies along with Postgres dependencies in the project to save or persist a user's data in a database for future use. As you advance, you'll see how to write tests and test a service using Mockito. Finally, you'll create a CI workflow or pipeline for a Spring Boot and Angular application to enable operations to deliver quality applications faster.By the end of this Spring Boot and Angular book, you'll be able to build a full-stack web application and deploy it through continuous integration and continuous deployment.What You Will Learn:- Explore how to architect Angular for enterprise-level app development- Create a Spring Boot project using Spring Initializr- Build RESTful APIs for enterprise-level app development- Understand how using Redis for caching can improve your application s performance- Discover CORS and how to add CORS policy in the Spring Boot application for better security- Write tests to maintain a healthy Java Spring Boot application- Implement testing and modern deployments of frontend and backend applicationsWho this book is for:The book is for busy Java web developers and TypeScript developers with little experience developing Angular and Spring Boot apps who want to learn best practices for building full-stack web apps. Basic knowledge of HTML, CSS, and JavaScript or the Java programming language is necessary.Table of Contents- Spring Boot and Angular - The Big Picture- Setting Up the Development Environment- Moving into Spring Boot- Setting Up the Database and Spring Data JPA- Building APIs with Spring- Documenting APIs with OpenAPI Specification- Adding Spring Boot Security with JWT- Logging Events in Spring Boot- Writing Tests in Spring Boot- Setting Up Our Angular Project and Architecture- Building Reactive Forms- Managing States with NgRx- Saving, Deleting, and Updating with NgRx- Adding Authentication in Angular- Writing Tests in Angular- Packaging Backend and Frontend with Maven- Deploying Spring Boot and the Angular App
Make fact-based decisions by comparing different solutions and learning popular ways to manage state in React Native with clear guidelines and recommendations by a React Native expertKey Features:Explore the big picture of state management in React Native using the most simplified versionImplement state management solutions by building a social media clone appCompare different state solutions in a contained environment to choose the best fit for your future projectsBook Description:Managing state in a React Native app can be challenging as it is one of the most difficult concepts to grasp while learning React Native. This is because there are so many ways to do it, and because there is a lack of clear guidelines on what should be used and why.Simplifying State Management in React Native is a comprehensive introduction for those who are new to creating robust React Native apps that will have you up to speed in no time. You'll get to grips with the different state management strategies and libraries available. As you progress through the chapters, you'll try out different solutions, as well as compare and choose which solution is perfectly suited to your future projects and personal preferences. Finally, you'll create a social media clone app using all the concepts and examples that you've learned in this book.By the end of this book, you'll be able to take on existing projects that use various state management strategies and libraries, and confidently make decisions about state management.What You Will Learn:Start out by going over the basic ReactJS "mindset"Explore all that ReactJS has to offer to manage state in apps by building an appUnderstand existing state management libraries such as Redux, MobX, XState, Jotai, and React QueryDecide which libraries you want to use in your appsDesign a social media app to fully understand state managementTry out all the solutions presented in the book in a social media clone appWho this book is for:This book is for junior developers, React Native developers, and mobile app developers who are already using React Native, but are also on the lookout for advice and for a broader view to manage the state and changes in their applications. Basic knowledge of ReactJS and React Native, as well as familiarity with JavaScript and general mobile app development concepts are needed to grasp the topics covered in this book.
Currently, there is not much information describing the entire workflow of creating and animating a digital human using the MetaHuman Creator and Unreal Engine 5. This book fixes the issue by getting you up and running with these technologies and providing you with everything you need to know about creating a dynamic, realistic digital human.
Explore tools, techniques, and practices to remove performance bottlenecks and enhance the stability of your Laravel and PHP web applicationsKey Features:Get a complete view of what it takes to design and build a high-performing application with OctaneReuse objects across requests and execute application logic asynchronouslyLearn key elements to design and build a performance-optimized and production-ready applicationBook Description:Laravel Octane is a very powerful component in the Laravel ecosystem that can help you achieve remarkable app performance. With Laravel Octane, you will find tools (queues, cache, and tables) that facilitate a new asynchronous approach for improving application performance.This book highlights how Laravel Octane works, what steps to take in designing an application from the start, what tools you have at your disposal, and how to set up production environments. It provides complete coverage of the strategies, tools, and best practices to make your apps scalable and performant. This is especially important as optimization is usually the overlooked part in the application development lifecycle. You will explore the asynchronous approach in Laravel and be able to release high-performing applications that have a positive impact on the end-user experience.By the end of this book, you will find yourself designing, developing, and releasing high-performance applications.What You Will Learn:Understand the dynamics of the request life cycle in a classic Laravel applicationExplore possibilities with OpenSwoole and Roadrunner and choose the best solution for your applicationAnalyze the potential bottlenecks of a classic web applicationConfigure Laravel Octane with Roadrunner and OpenSwooleImplement functionality using asynchronous mechanisms and run tasks in parallel in the Laravel appPrepare the production environment to host Laravel Octane and its dependenciesUnderstand the pros and cons of applying potential enhancements to your Laravel appWho this book is for:The book is for existing Laravel developers who want to improve their software architecture, from a basic or standard architecture to a more scalable and performant one. Basic knowledge of Laravel fundamentals is required.
Get to grips with identity patterns and design a structured enterprise identity model for cloud applicationsKey Features:Learn all you need to know about different identity patterns and implementing them in real-world scenariosHandle multi-IDP-related common situations no matter how big your organizationGain practical insights into OAuth implementation patterns and flowsBook Description:Identity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect's perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions.Throughout this book, you'll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you'll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You'll also be able to make sense of how modern application designs are impacted by the company's choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on.By the end of this book, you'll be able to breeze through creating portable, robust, and reliable applications that can interact with each other.What You Will Learn:Understand the evolution of identity in the enterpriseDiscover basic to advanced OAuth patterns and implementationsFind out how OAuth standards are usually adopted in the enterpriseExplore proven solutions for modern identity challengesUse Azure AD for implementing identity solutionsComprehend how company structure and strategies influence design decisionsWho this book is for:This book is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this book useful. This book covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful.
A hands-on guide to help you develop skills and confidence in building and structuring React applications in a well-organized way using the best tools in the React 18 ecosystemKey Features:- Discover solutions to complex problems faced while creating production-ready apps with React- Develop scalable React applications with Next.js using a step-by-step approach from analysis to deployment- Get an overview of the React ecosystem and identify the best tools to meet your app requirementsBook Description:Building large-scale applications in production can be overwhelming with the amount of tooling choices and lack of cohesive resources. To address these challenges, this hands-on guide covers best practices and web application development examples to help you build enterprise-ready applications with React in no time.Throughout the book, you'll work through a real-life practical example that demonstrates all the concepts covered. You'll learn to build modern frontend applications-built from scratch and ready for production. Starting with an overview of the React ecosystem, the book will guide you in identifying the tools available to solve complex development challenges. You'll then advance to building APIs, components, and pages to form a complete frontend app. The book will also share best practices for testing, securing, and packaging your app in a structured way before finally deploying your app with scalability in mind.By the end of the book, you'll be able to efficiently build production-ready applications by following industry practices and expert tips.What You Will Learn:- Use a good project structure that scales well with your application- Create beautiful UIs with Chakra UI and emotion- Configure a base Next.js app with static code analysis and Git hooks- Learn to mock API endpoints for prototyping, local development and testing- Choose an optimal rendering strategy in Next.js based on the page needs- Learn to choose the best state management solution for given problem- Write unit tests, integration tests and e2e tests in your React Application- Deploy your React applications on VercelWho this book is for:This book is for intermediate-level web developers who already have a solid understanding of JavaScript, React, and web development in general and want to build large-scale React applications effectively. Beginner-level TypeScript experience, along with JavaScript and React, will be beneficial.Table of Contents- Understanding the Architecture of React Applications- Setup and Project Structure Overview- Building and Documenting Components- Building and Configuring Pages- Mocking the API- Integrating the API into the Application- Implementing User Authentication and Global Notifications- Testing- Configuring CI/CD for Testing and Deployment- Going Beyond
Understand the world of modern network automation with Go and deepen your knowledge with insights from 10+ experts who have real-world hands-on experience with network automation and/or are using Go for network-related tasksKey FeaturesA comprehensive guide to the world of modern network automationUse Go to build anything from repetitive task automation to complex distributed systemsOver 30 practical, ready-to-use sample programsBook DescriptionGo's built-in first-class concurrency mechanisms make it an ideal choice for long-lived low-bandwidth I/O operations, which are typical requirements of network automation and network operations applications. This book provides a quick overview of Go and hands-on examples within it to help you become proficient with Go for network automation. It's a practical guide that will teach you how to automate common network operations and build systems using Go. The first part takes you through a general overview, use cases, strengths, and inherent weaknesses of Go to prepare you for a deeper dive into network automation, which is heavily reliant on understanding this programming language. You'll explore the common network automation areas and challenges, what language features you can use in each of those areas, and the common software tools and packages. To help deepen your understanding, you'll also work through real-world network automation problems and apply hands-on solutions to them. By the end of this book, you'll be well-versed with Go and have a solid grasp on network automation.What you will learnUnderstand Go programming language basics via network-related examplesFind out what features make Go a powerful alternative for network automationExplore network automation goals, benefits, and common use casesDiscover how to interact with network devices using a variety of technologiesIntegrate Go programs into an automation frameworkTake advantage of the OpenConfig ecosystem with GoBuild distributed and scalable systems for network observabilityWho this book is forThis book is for all network engineers, administrators, and other network practitioners looking to understand what network automation is and how the Go programming language can help develop network automation solutions. As the first part of the book offers a comprehensive overview of Go's main features, this book is suitable for beginners with a solid grasp on programming basics.Table of ContentsIntroductionGo BasicsGetting Started with GoNetworking (TCP/IP) with GoNetwork AutomationConfiguration ManagementAutomation FrameworksNetwork APIsOpenConfigNetwork MonitoringExpert InsightsAppendix: Building a Testing Environment
Avoid implementation failures and technical debt by mitigating anti-patterns in your Salesforce enterprise solutions using expert guidance and proven recommendationsPurchase of the print or Kindle book includes a free eBook PDFKey FeaturesBuild exemplary Salesforce architectures by studying anti-patterns that lead to failing systemsDemonstrate deep architectural principles that you can apply in your Salesforce projectsIdentify common problems in Salesforce architectures and apply better architectural solutionsBook DescriptionSalesforce Anti-Patterns teaches you to spot errors in Salesforce patterns that may seem like a good idea at first but end up costing you dearly. This book will enable Salesforce developers and architects to understand how ingenious Salesforce architectures can be created by studying anti-patterns and solutions to problems that can later lead to serious implementation issues. While there are several books on the market that start with the question, "How do I create great Salesforce architecture?" and proceed to a solution from there, this book instead starts by asking, "What tends to go wrong with Salesforce architectures?" and proceeds to a solution from there.In this book, you'll find out how to identify and mitigate anti-patterns in the technical domains of system architecture, data architecture, and security architecture, along with anti-patterns in the functional domain of solution architecture as well as for integration architecture. You'll also learn about common anti-patterns affecting your Salesforce development process and governance and, finally, how to spot common problems in how architects communicate their solutions.By the end of this Salesforce book, you'll have gained the confidence to architect and communicate solutions on the Salesforce platform while dodging common mistakes.What you will learnCreate a balanced system architecture by identifying common mistakes around on- and off-platform functionality and interfacesAvoid security problems that arise from anti-patterns on the Salesforce platformSpot common data architecture issues and discover intuitive ways to address themAvoid the dual traps of over- and under-customization in your solution architectureExplore common errors made in deployment setups, test strategy, and architecture governanceUnderstand why bad communication patterns are so overlooked in architectureWho this book is forThis book is for Salesforce architects, aspiring architects, developers, consultants, and decision makers who want to start making the right architectural choices or prepare for their journey to CTA. This book helps you gain a professional understanding of Salesforce and its building blocks. It is not code-centric, so you will benefit from both functional and technical experience, but a basic level of platform understanding is required.Table of ContentsWhy You Need to Understand Salesforce Anti-PatternsHow Not to Mess Up Your System ArchitectureHow Not to Get Confused about SecurityWhat Not to Do about Data?Unpicking Solution Architecture TroublesKeeping Integration StraightKeeping the Development Life Cycle from Going off TrackCommunication without Mistranslation Conclusion
Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threatsKey Features:- Create a solid incident response framework and manage cyber incidents effectively- Learn to apply digital forensics tools and techniques to investigate cyber threats- Explore the real-world threat of ransomware and apply proper incident response techniques for investigation and recoveryBook Description:An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated third edition will help you perform cutting-edge digital forensic activities and incident response with a new focus on responding to ransomware attacks.After covering the fundamentals of incident response that are critical to any information security team, you'll explore incident response frameworks. From understanding their importance to creating a swift and effective response to security incidents, the book will guide you using examples. Later, you'll cover digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. You'll be able to apply these techniques to the current threat of ransomware. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis and demonstrate how you can proactively use your digital forensic skills in threat hunting.By the end of this book, you'll be able to investigate and report unwanted security breaches and incidents in your organization.What You Will Learn:- Create and deploy an incident response capability within your own organization- Perform proper evidence acquisition and handling- Analyze the evidence collected and determine the root cause of a security incident- Integrate digital forensic techniques and procedures into the overall incident response process- Understand different techniques for threat hunting- Write incident reports that document the key findings of your analysis- Apply incident response practices to ransomware attacks- Leverage cyber threat intelligence to augment digital forensics findingsWho this book is for:This book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organizations. You'll also find the book helpful if you're new to the concept of digital forensics and looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book.Table of Contents- Understanding Incident Response- Managing Cyber Incidents- Fundamentals of Digital Forensics- Investigation Methodology- Collecting Network Evidence- Acquiring Host-Based Evidence- Remote Evidence Collection- Forensic Imaging- Analyzing Network Evidence- Analyzing System Memory- Analyzing System Storage- Analyzing Log Files- Writing the Incident Report- Ransomware Preparation and Response- Ransomware Investigations- Malware Analysis for Incident Response- Leveraging Threat Intelligence- Threat Hunting
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.