|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_on1099554285 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||||||| |
008 |
181205s2017 xx o 000 0 eng |
040 |
|
|
|a AU@
|b eng
|e pn
|c AU@
|d C6I
|d OCLCQ
|
020 |
|
|
|z 9781491994917
|
024 |
8 |
|
|a 9781491994931
|
029 |
0 |
|
|a AU@
|b 000065067731
|
035 |
|
|
|a (OCoLC)1099554285
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Webber, Kevin,
|e author.
|
245 |
1 |
0 |
|a Migrating Java to the Cloud /
|c Webber, Kevin.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b O'Reilly Media, Inc.,
|c 2017.
|
300 |
|
|
|a 1 online resource (50 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
520 |
|
|
|a Estimates vary but the message is clear: cloud spending worldwide is soaring, and much of the demand is coming from companies looking to migrate existing systems. Transforming a monolithic legacy application into a cloud native system is no small feat, but with this in-depth report, your organization will learn ways to migrate classical Java applications to newly provisioned cloud infrastructure without requiring a significant rewrite. Authors Kevin Webber and Jason Goodwin cover proven steps and techniques that enable your company to take advantage of cloud infrastructure's power and flexibility. You'll explore three pillars of successful cloud adoption-infrastructure refresh, application modernization and migration, and security modernization-and learn how to treat the cloud as an unlimited pool of resources that brings both scale and resilience to your system. This report covers: Cloud native requirements: critical traits applications must possess before they're deployed to cloud infrastructure Modernizing heritage applications: proven techniques and tools for refactoring existing legacy Java applications to real-time, event-driven, cloud-native systems Getting cloud-native deployments right: best practices for deploying enterprise services to public, private, and hybrid clouds, and for meeting common organizational challenges along the way Cloud security: methods for shoring up the least-secure channels in enterprise systems-from social engineering to known vulnerabilities-before deployment to cloud infrastructure.
|
542 |
|
|
|f Copyright © O'Reilly Media, Inc.
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
700 |
1 |
|
|a Goodwin, Jason,
|e author.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781491994931/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|