Join us on a literary world trip!
Add this book to bookshelf
Grey
Write a new comment Default profile 50px
Grey
Subscribe to read the full book or read the first pages for free!
All characters reduced
Practical Serverless and Microservices with C# - Build resilient and secure microservices with the NET stack and embrace serverless development in Azure - cover

Practical Serverless and Microservices with C# - Build resilient and secure microservices with the NET stack and embrace serverless development in Azure

Gabriel Baptista, Francesco Abbruzzese

Publisher: Packt Publishing

  • 0
  • 0
  • 0

Summary

From the authors of the Software Architecture with C# and .NET series comes this practical and grounded showcase of microservices using the .NET stack. 
Written for .NET developers entering the world of modern cloud and distributed applications, it shows you when microservices and serverless architectures are the right choice for building scalable enterprise solutions and when they’re not. You’ll gain a realistic understanding of their use cases and limitations. Rather than promoting microservices as a one-size-fits-all solution, it encourages thoughtful adoption based on real-world needs.
Following a brief introduction and important setup, the book helps you prepare for practical application through examples such as a ride-sharing website. You’ll work with Docker, Kubernetes, Azure Container Apps, and the new .NET Aspire with considerations for security, observability, and cost management. The book culminates in a complete event-driven application that brings together everything you've covered.
By the end of the book, you’ll have a well-rounded understanding of cloud and distributed .NET—viewed through the lens of two industry veterans.
Available since: 07/03/2025.
Print length: 472 pages.

Other books that might interest you

  • The Voyage of the Beagle - cover

    The Voyage of the Beagle

    Charles Darwin

    • 0
    • 0
    • 0
    A young Charles Darwin sets sail in 1831 aboard HMS Beagle, embarking on a five-year scientific expedition. The Beagle's mission is to chart the coast of South America, but for Darwin, the journey becomes a pivotal opportunity to collect extensive geological and biological data. His observations on diverse landscapes and unique species, particularly during his time on the Galapagos Islands, challenge prevailing scientific views and lay the groundwork for his groundbreaking theory of evolution by natural selection.
    Show book
  • Deep Sleep Hypnosis: Fall Asleep Instantly & Sleep Well - Guided Meditation With Affirmations for Relaxation Insomnia Anxiety & Stress - cover

    Deep Sleep Hypnosis: Fall Asleep...

    Meditative Hearts

    • 0
    • 0
    • 0
    When you have a problem or dis-ease, sleep on it. Sleep will heal anything. 
    This guided meditation will take you on a journey into your body and beyond. 
    You will start to deeply relax every part of your body. 
    When you fully relax, you allow more consciousness to flow into your body. This is the healing state. 
    Your body-mind will relax completely until you start to drift off into a deep rejuvenating sleep. 
    You will sleep like a baby 
    When you sleep, you will let go of everything that you don´t need anymore. 
    You will be fresh and clean when you wake up in the morning. 
    Your new life has begun.
    Show book
  • Data Analysis - Data Quality Challenges and real world Applications - cover

    Data Analysis - Data Quality...

    Bright Mills

    • 0
    • 0
    • 0
    Data Analysis is a critical process in both academic and professional environments that involves inspecting, cleansing, transforming, and modeling data to discover useful information, derive conclusions, and support decision-making. It is foundational to nearly every field, from business and healthcare to engineering and social sciences. The ultimate aim of data analysis is to extract actionable insights from raw data, turning numbers and records into knowledge that can guide strategies and policy. 
    This paper provides an in-depth exploration of data analysis, covering both theoretical underpinnings and practical applications. It begins by defining what data analysis is and discussing its historical evolution. It delves into different types of data (quantitative, qualitative, structured, unstructured) and explains the steps in the data analysis lifecycle: from data collection and preparation to interpretation and reporting. 
    The paper further categorizes types of data analysis (descriptive, diagnostic, predictive, and prescriptive) and explains key techniques used in each. Statistical methods, data visualization, machine learning, and data mining approaches are thoroughly examined. Tools such as Excel, Python, R, and SQL are discussed in the context of their suitability for various analysis tasks. 
    Ethical considerations, data quality challenges, and real-world applications in industries like healthcare, marketing, finance, and public policy are also addressed. Finally, the paper concludes by highlighting emerging trends in data analysis, such as automated analytics and AI-driven insights. 
    This document serves as a comprehensive guide for students, researchers, professionals, and anyone interested in the field of data analysis, equipping readers with both conceptual knowledge and practical strategies to approach complex data-driven problems.
    Show book
  • Ultimate Linux Network Security for Enterprises - Master Effective and Advanced Cybersecurity Techniques to Safeguard Linux Networks and Manage Enterprise-Level Network Services - cover

    Ultimate Linux Network Security...

    Adarsh Kant

    • 0
    • 0
    • 0
    "Level Up Your Security Skills with Linux Expertise!"
    Key Features
    - Comprehensive exploration of Linux network security and advanced techniques to defend against evolving cyber threats.
    - Hands-on exercises to reinforce your understanding and gain practical experience in implementing cybersecurity strategies.
    - Gain valuable insights from industry best practices to effectively address emerging threats and protect your organization's digital assets within the evolving landscape of Linux network security.
    Book Description
    TheUltimate Linux Network Security for Enterprisesis your essential companion to mastering advanced cybersecurity techniques tailored for Linux systems.
    The book provides a comprehensive exploration of Linux network security, equipping you with the skills and knowledge needed to defend against evolving cyber threats. Through hands-on exercises, real-world scenarios, and industry best practices, this book empowers you to fortify your organization’s networks with confidence. Discover practical insights and techniques that transcend theoretical knowledge, enabling you to apply effective cybersecurity strategies in your job role.
    From understanding fundamental concepts to implementing robust security measures, each chapter provides invaluable insights into securing Linux-based networks. Whether you are tasked with conducting vulnerability assessments, designing incident response plans, or implementing intrusion detection systems, this book equips you with the tools and expertise to excel in your cybersecurity endeavors. By the end of this book, you will gain the expertise needed to stay ahead of emerging threats and safeguard your organization’s digital assets.
    What you will learn
    - Perform thorough vulnerability assessments on Linux networks to pinpoint network weaknesses.
    - Develop and deploy resilient security incident response plans.
    - Configure and oversee sophisticated firewall and packet filtering rules.
    - Employ cryptography techniques to ensure secure data transmission and storage.
    - Implement efficient Intrusion Detection and Prevention Systems (IDS/IPS).
    - Enforce industry-leading best practices to bolster Linux network security defenses.
    Table of Contents
    1. Exploring Linux Network Security Fundamentals
    2. Creating a Secure Lab Environment
    3. Access Control Mechanism in Linux
    4. Implementing Firewalls And Packet Filtering
    5. Mastering Cryptography for Network Security
    6. Intrusion Detection System and Intrusion Prevention System
    7. Conducting Vulnerability Assessment with Linux
    8. Creating Effective Disaster Recovery Strategies
    9. Robust Security Incident Response Plan
    10. Best Practices for Linux Network Security ProfessionalsIndex
    Show book
  • Microdosing Psilocybin Mushrooms - An Essential Guide to Microdosing Magic Mushrooms & Microdosing Journal - cover

    Microdosing Psilocybin Mushrooms...

    Bil Harret, Anastasia V. Sasha

    • 0
    • 0
    • 0
    Are you looking to relieve any physical or mental health conditions for which psilocybin has shown potential? Perhaps without the side effects commonly associated with many pharmaceuticals 
    Countless research and anecdotal reports have shown that psilocybin can help relieve numerous mental health disorders such as depression, anxiety, crippling fear, substance dependence, PTSD, and OCD, among others. And not only mental health conditions but also physical ailments such as migraines or cluster headaches, among others. Additionally, it has been used to noticeably improve your daily performance and general well-being. 
    But even with the outstanding benefits, little is known about microdosing psilocybin, and the information out there lacks accuracy and depth, making this venture harder than it should be… until now. 
    Microdosing Psilocybin Mushrooms is an all-inclusive, carefully researched, up-to-date, and beginner-friendly guide to everything there is to know about microdosing with psilocybin mushrooms. 
    Discover:The transformational power of psilocybin, its nature, and its influence on the human brainThe rich history of psilocybin mushrooms, dated back as far as you might have ever imaginedWhat to do to zero in on your optimal doseAll the therapeutic applications of psilocybinThe best microdosing protocolsPossible side effects and disqualified individualAnd much more! 
    It doesn’t matter whether you’ve tried microdosing mushrooms before and are looking to refine your knowledge or haven’t ever held them in your hand and want to learn more about this nascent topic; this guide will walk you through the whole process until you are psilocybin-versed!
    Show book
  • The Woman Inside - from Outer Space to Inner Peace - cover

    The Woman Inside - from Outer...

    Anonymous

    • 0
    • 0
    • 0
    The Woman Inside: From Outer Space to Inner Peace will take you on a journey of self-discovery. Throughout a 34-year career at NASA, launching rockets or leading teams, while literally traveling around the world, the book takes you on a journey of discovery and transformation. This is one woman’s experience of transitioning from presenting as male to presenting as female. You will join me as I overcome the societal expectations that are assigned at birth and learn to, understand the difference between sexual hardware and gender software. Finally, you will see how I discovered the ultimate truth -- that you are never too old to live life as your authentic self. If you are interested in NASA or exploring distant lands or how one makes the decision to transition, then this book is for you. This is my story and my life. By the end, you will know me almost as well as I know myself. I hope you enjoy it. Bobbi
    Show book