- Hands-On Spring Security 5 for Reactive Applications
- Tomcy John
- 107字
- 2021-07-23 18:59:10
Resilient
In the case of failure, resilient systems stay responsive and interactable. Resilience in an application can be achieved by:
- Replication: Running the same component in more than one place, so that if one fails, another could handle it and the application can function in a normal fashion.
- Containment/isolation: Issues of a particular component are contained and isolated within that component and don't interfere with other components or other similar components spun up as part of replication.
- Delegation: In the case of an issue in a component, without much deliberation, the control is transferred to another similar component that is running in a completely different context.
推薦閱讀
- Extending Symfony2 Web Application Framework
- CTF實戰:技術、解題與進階
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 信息系統安全檢測與風險評估
- Web安全與攻防入門很輕松(實戰超值版)
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 網絡安全與攻防入門很輕松(實戰超值版)
- 實用黑客攻防技術
- INSTANT Microsoft Forefront UAG Mobile Configuration Starter
- 企業安全建設入門:基于開源軟件打造企業網絡安全
- Web前端黑客技術揭秘
- 數據安全實踐:能力體系、產品實現與解決方案
- 網絡安全攻防技術實戰
- 從實踐中學習TCP/IP協議
- Hack-A-Sat太空信息安全挑戰賽深度題解