My passion for computer science started while spending my free time gaming in my young adult days, leading me to experiment with C++ and then dive into enterprise-level Java applications during high school. My enthusiasm for Java propelled me to teach and share my knowledge through Java and Spring tutorials on YouTube. I also frequent conferences where I exchange ideas on various software topics. My constant wish to contribute further to the community is filled by writing technical books. This mix of teaching, creating, and constant learning fuels me and pushes me further into the tech world. I really hope you will enjoy this selection of technical books!
This book captivated me with its thorough breakdown of Kubernetes core components like pods, services, and deployments.
I appreciated how the authors presented these advanced topics in a way that would make sense to anyone, really enhancing my ability to integrate Kubernetes into a development workflow and gain a new point of view on scalability, deployment speed, etc.
What truly sets this book apart for me, however, is its remarkable balance between theoretical insights and practical application, as this is the key balance when aiming to learn something new. I was particularly impressed by the hands-on examples that prepare you, to a certain extent. for a real-life scenario.
With Kubernetes, users don't have to worry about which specific machine in their data center their application is running on. Each layer in their application is decoupled from other layers so they can scale, update, and maintain them independently.
Kubernetes in Action teaches developers how to use Kubernetes to deploy self-healing scalable distributed applications. By the end, readers will be able to build and deploy applications in a proper way to take full advantage of the Kubernetes platform.
Mastering a tool like Hibernate is essential when dealing with Spring Boot and databases, as it can simplify the development process if used correctly.
I was particularly impressed by how the authors tackled complex concepts like caching, lazy loading, and transaction management, making them accessible and relatable to persons with zero to no experience, and also making sure that someone with experience does not get bored either.
I found that managing entities correctly and knowing how to deal with JPQL automatically results in a cleaner, more scalable, and performant code base.
Persistence-the ability of data to outlive an instance of a program-is central to modern applications. Hibernate, the most popular provider of the Java Persistence standard, offers automatic and transparent object/relational mapping, making it a snap to work with SQL databases in Java applications.
Java Persistence with Hibernate, Second Edition explores Hibernate by developing an application that ties together hundreds of individual examples. It digs into the rich programming model of Hibernate, working through mappings, queries, fetching strategies, transactions, conversations, caching, and more and provides a well-illustrated discussion of best practices in database design and optimization techniques. This revised edition…
To be honest, I did not expect to learn something new from this book, given the fact that I have been working on enterprise-level applications since high school, which mostly follow a microservice architecture.
Still, I have to admit that in Richardson's discussion on decomposition strategies, inter-service communication, and managing distributed data, I still got some valuable insights into dealing with such an architecture. Particularly, the saga pattern for managing transactions was definitely a game-changer for me.
Docker is the technology that works perfectly along with Kubernetes, and I believe that in such a fast-paced development environment, applications do not need to depend on the machine that they are running on.
What truly stood out for me was the exploration of Docker's features like images, networks, containers, and volumes, and how these elements create a consistent environment for applications to run. This consistency is key in eliminating the "well, it works on my machine" problem, making our lives easier and our work more portable.
The idea behind Docker is simple. Create a tiny virtual environment called a container that holds just your application and its dependencies. The Docker engine uses the host operating system to keep track of your containers. Applications running inside containers share resources, making their footprints small. They are easy to install, manage, and remove. Docker in Action, Second Edition teaches you to create, deploy, and manage applications hosted in Docker containers running on Linux. Fully updated, with four new chapters and revised best practices and examples, this second edition begins with a clear explanation of the Docker model. Then, you…
This is another amazing book that offers a fresh view of microservice architecture and its benefits and challenges.
Besides advice on designing and managing microservices for large-scale Java applications, the part that stuck out to me the most was the deep dive into cloud-native development and the "Just enough Application Server (JeAS)" approach.
Any book that makes me rethink and improve my strategies for building resilient and robust apps is a gem.
Microservices break down a large application into smaller components, each interacting with each other to create a united whole. As each component can start, stop, and scale independently, so the whole system benefits from better fault-tolerance and resilience.
Enterprise Java Microservices is an example-rich tutorial that shows readers how to design and manage large-scale Java applications as a collection of microservices.
Key features
* The microservices mental model
* Fault tolerance with Netflix Hystrix
* Securing your microservices
* Deploying to the cloud
Audience
This book is for Java developers familiar with distributed n-tier application architecture.
Any Java developer who wants to master authentication and authorization in Spring apps needs to know Spring Security. Applications nowadays have to be carefully protected from data theft and unauthorized intrusions; therefore, using both Spring Security's out-of-the-box features and "secure by design" principles is the key to a “bulletproof” application.
Between the key subjects tackled in this book, you will find custom implementations of authentication and authorization, setting up components of an OAuth 2/OpenID Connect system, utilizing CORS and CRSF configurations, and many more. You will also learn how to create your own authorization server, supervise system users, set up secure endpoints, and avoid cross-site scripting and request forgery attacks.