Subject

Development

Logical Access Protection: Securing the use of your AWS account with IAM

From AWS Security by Dylan Shields

This article deals with methods you can use to secure your AWS account.

Managing Component State with the useState Hook

From React Hooks in Action by John Larsen

If you’re building React apps, then you’re expecting the data your app uses to change over time. Whether it’s fully server-rendered, a mobile app or all in a browser, your application’s user interface should represent the current data or state at the time of rendering. Sometimes multiple components throughout the app will use the data, and sometimes a component doesn’t need to share its secrets and can manage its own state without the help of mammoth, application-wide state-store behemoths. In this article, we’ll keep it personal and concentrate on components taking care of themselves, without regard for other components around them.

Call or Pass?

From Five Lines of Code by Christian Clausen

This article delves into when a function should call a method on an object or pass it on as an argument.

Building practical blockchain apps

From Programming Hyperledger Fabric by Siddharth Jain

The guide to EF Core

From Entity Framework Core in Action, Second Edition by Jon P Smith

Writing and Managing Application Logs with Docker

From Learn Docker in a Month of Lunches by Elton Stoneman

Logging is usually the most boring part of learning a new technology, but it’s not the case with Docker. The basic principle is simple: you need to make sure your application logs are written to the standard output stream, because this is where Docker looks for them. This can be achieved in a couple of ways, which we’ll cover in this article, and then the fun begins.

Introducing the OpenAPI Specification

From Designing APIs with Swagger and OpenAPI by Josh Poenlat

This article covers:

  Informal vs Formal descriptions

  Learning about the OpenAPI specification

  Learning about YAML ( as a easier-to-write JSON )

  Describing our first GET operation

Organize your logs

From Unified Logging with Fluentd by Phil Wilkins

Capability-Based Security and Macaroons

From API Security in Action by Neil Madden

In this article, you’ll implement capability-based access control techniques that enable secure sharing by taking the principle of least authority (POLA) to its logical conclusion and allowing fine-grained control over access to individual resources. Along the way, you’ll see how capabilities prevent a general category of attacks against APIs known as confused deputy attacks.

Getting to Know Knative

From Knative in Action by Jacques Chester

This article introduces Knative and explores its function(s) and best use.

© 2020 Manning — Design Credits