- Hands-On Spring Security 5 for Reactive Applications
- Tomcy John
- 200字
- 2021-07-23 18:59:10
Message-driven
In reactive applications, one of the main aspects is the usage of asynchronous messages to pass data from one component to another. This brings loose coupling between components and aids in achieving location transparency (as long as the component is reachable/discoverable, it can reside in a single node or a cluster of nodes anywhere). Create a message, publish, and forget. Registered subscribers receive the message, process it, and broadcast the message for the other subscribes to do their jobs. This is one of the core aspects of reactive programming and it is one of the fundamental aspects needed for a reactive system. This fire-and-forget concept brings in a non-blocking way of communication, resulting in highly scalable applications.
The following diagram (Figure 1) clearly shows the Reactive Manifesto in a pictorial fashion. It also clearly shows the relationship between the main concepts on the Reactive Manifesto:
Since reactive applications are responsive, resilient, elastic, and message-driven, these applications are inherently highly flexible, highly scalable, loosely coupled, and fault-tolerant.
Mateusz Gajewski, in one of his presentations shared on www.slideshare.net, sums up the Reactive Manifesto in a very nice way:
- 特種木馬防御與檢測(cè)技術(shù)研究
- 黑客攻防入門秘笈
- 數(shù)字安全藍(lán)皮書:本質(zhì)屬性與重要特征
- Penetration Testing with Perl
- 計(jì)算機(jī)病毒原理與防范(第2版)
- 反黑命令與攻防從新手到高手(微課超值版)
- Kali Linux Network Scanning Cookbook(Second Edition)
- 黑客攻防與網(wǎng)絡(luò)安全從新手到高手(絕招篇)
- Building a Home Security System with BeagleBone
- 物聯(lián)網(wǎng)安全滲透測(cè)試技術(shù)
- Mastering Python for Networking and Security
- 功能型密碼算法設(shè)計(jì)與分析
- Web安全攻防從入門到精通
- Securing Network Infrastructure
- 5G網(wǎng)絡(luò)安全規(guī)劃與實(shí)踐