Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs

Buy

Build effective RESTful APIs for enterprise with design patterns and REST framework's out-of-the-box capabilities

Key Features

  • Understand advanced topics such as API gateways, API securities, and cloud
  • Implement patterns programmatically with easy-to-follow examples
  • Modernize legacy codebase using API connectors, layers, and microservices

Book Description

This book deals with the Representational State Transfer (REST) paradigm, which is an architectural style that allows networked devices to communicate with each other over the internet. With the help of this book, you'll explore the concepts of service-oriented architecture (SOA), event-driven architecture (EDA), and resource-oriented architecture (ROA). This book covers why there is an insistence for high-quality APIs toward enterprise integration.

It also covers how to optimize and explore endpoints for microservices with API gateways and touches upon integrated platforms and Hubs for RESTful APIs. You'll also understand how application delivery and deployments can be simplified and streamlined in the REST world. The book will help you dig deeper into the distinct contributions of RESTful services for IoT analytics and applications.

Besides detailing the API design and development aspects, this book will assist you in designing and developing production-ready, testable, sustainable, and enterprise-grade APIs. By the end of the book, you'll be empowered with all that you need to create highly flexible APIs for next-generation RESTful services and applications.

What you will learn

  • Explore RESTful concepts, including URI, HATEOAS, and Code on Demand
  • Study core patterns like Statelessness, Pagination, and Discoverability
  • Optimize endpoints for linked microservices with API gateways
  • Delve into API authentication, authorization, and API security implementations
  • Work with Service Orchestration to craft composite and process-aware services
  • Expose RESTful protocol-based APIs for cloud computing

Who this book is for

This book is primarily for web, mobile, and cloud services developers, architects, and consultants who want to build well-designed APIs for creating and sustaining enterprise-class applications. You'll also benefit from this book if you want to understand the finer details of RESTful APIs and their design techniques along with some tricks and tips.

Table of Contents

  1. Introduction to the Basics of RESTful Architecture
  2. Design Strategy, Guidelines, and Best Practices
  3. Essential RESTful API Patterns
  4. Advanced RESTful API Patterns
  5. Microservice API Gateways
  6. RESTful Services API Testing and Security
  7. RESTful Service Composition for Smart Applications
  8. RESTful API Design Tips
  9. A More In-depth View of the RESTful Services Paradigm
  10. Frameworks, Standard Languages, and Toolkits
  11. Legacy Modernization to Microservices-centric Apps
(HTML tags aren't allowed.)

Integrated Community-Managed Development: Strategizing Indigenous Knowledge and Institutions for Poverty Reduction and Sustainable Community Development in Indonesia (Cooperative Management)
Integrated Community-Managed Development: Strategizing Indigenous Knowledge and Institutions for Poverty Reduction and Sustainable Community Development in Indonesia (Cooperative Management)
This book provides an overview of recent advances in Integrated Community-Managed Development (ICMD) as an innovative strategy for the community-based development of local institutions in order to achieve lasting poverty reduction and empowerment. The original approach presented here to improving the lives and livelihoods of the poor takes...
A Distributed Pi-Calculus
A Distributed Pi-Calculus
Distributed systems are fast becoming the norm in computer science. Formal mathematical models and theories of distributed behavior are needed in order to understand them. This book proposes a distributed pi-calculus called Dpi, for describing the behavior of mobile agents in a distributed world. It is based on an existing formal language, the...
Advances in Imaging and Electron Physics, Volume 151
Advances in Imaging and Electron Physics, Volume 151

Advances in Imaging and Electron Physics merges two long-running serials-Advances in Electronics and Electron Physics and Advances in Optical and Electron Microscopy. This series features extended articles on the physics of electron devices (especially semiconductor devices), particle optics at high and low energies, microlithography, image...


Market Liberalism and Economic Patriotism in the Capitalist World-System (International Political Economy Series)
Market Liberalism and Economic Patriotism in the Capitalist World-System (International Political Economy Series)
This volume broadens the scope of 'comparative capitalism' within the Varieties of Capitalism (VoC) tradition. It endorses the employment of multiple perspectives, including critical political economy, institutionalist systems of capitalism, structuralist-dependency scholarship and world-systems theory. The contributors deal with the...
Beginning Php 4 (Programmer to Programmer)
Beginning Php 4 (Programmer to Programmer)
PHP is a rapidly growing Web technology which enables web designers to build dynamic, interactive web applications, incorporating information from a host of databases, and including features such as e-mail integration and dynamically generated images. PHP4 added tons of features to make web application development even easier, and this book will...
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

Learn to evaluate and compare data encryption methods and attack cryptographic systems

Key Features

  • Explore popular and important cryptographic methods
  • Compare cryptographic modes and understand their limitations
  • Learn to perform attacks on cryptographic...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy