- Hands-On Spring Security 5 for Reactive Applications
- Tomcy John
- 107字
- 2021-07-23 18:59:10
Resilient
In the case of failure, resilient systems stay responsive and interactable. Resilience in an application can be achieved by:
- Replication: Running the same component in more than one place, so that if one fails, another could handle it and the application can function in a normal fashion.
- Containment/isolation: Issues of a particular component are contained and isolated within that component and don't interfere with other components or other similar components spun up as part of replication.
- Delegation: In the case of an issue in a component, without much deliberation, the control is transferred to another similar component that is running in a completely different context.
推薦閱讀
- Extending Symfony2 Web Application Framework
- unidbg逆向工程:原理與實(shí)踐
- 工業(yè)控制網(wǎng)絡(luò)安全技術(shù)
- 計(jì)算機(jī)病毒原理與防范(第2版)
- 黑客攻防與無線安全從新手到高手(超值版)
- 數(shù)據(jù)安全與隱私計(jì)算(第3版)
- 硬黑客:智能硬件生死之戰(zhàn)
- 移動(dòng)APT:威脅情報(bào)分析與數(shù)據(jù)防護(hù)
- 華為防火墻實(shí)戰(zhàn)指南
- 持續(xù)集成:軟件質(zhì)量改進(jìn)和風(fēng)險(xiǎn)降低之道
- Hands-On Artificial Intelligence for Cybersecurity
- 云計(jì)算安全防護(hù)技術(shù)
- 功能型密碼算法設(shè)計(jì)與分析
- 黑客攻防從入門到精通:命令版
- 云計(jì)算安全技術(shù)與應(yīng)用