Inhalt: Most API testing doesn't actually test the API. This course shows how to validate your API from the consumer's point of view, testing to confirm that problems experienced by your end users are being solved. Join Keith Casey as he focuses on how to approach API testing by implementing a behavior-driven development model. Keith uses Gherkin to set up a Behat environment so you can see how to write and run your first test. Then, he shows how to build API test requests, including how to introduce variables, authenticate requests, and validate responses. He also covers refactoring tests, establishing system states, using extensions for batch operations, and more. Umfang: 01:13:55.00
Inhalt: A well-designed API includes not just URLs and response codes but also authentication, consistent structures, and useful JSON payloads. Luckily, the Slim micro framework makes it easy to move an API from concept to implementation to production. What used to take weeks or even months can usually be done in hours or days with Slim. This course begins with a simple application specification and builds it one step at a time. Each chapter includes a key concept, with examples from other public APIs, and then shows how to build it yourself with Slim. Learn about URL routing, validating input, and generating response codes and hypermedia payloads. Like any project, the first implementation may be a little messy but don't worry. The last chapter covers refactoring and what it takes to scale and support the API going forward. Umfang: 01:52:55.00
Inhalt: Having a solid understanding of how to correctly build APIs is important for any developer planning on creating websites. In this course, learn how to plan and model your own APIs, and explore the six REST design constraints that help guide your architecture. Keith Casey starts with a simple overview, including advice on identifying the users or "participants" of your system, and the activities they might perform with it. He discusses how to validate your design before you build it, and explores the HTTP concepts and REST constraints needed to build your API. To wrap up, Keith goes over some of the most common API design patterns you may encounter. Umfang: 01:24:32.00
Inhalt: Write better PHP code by following these popular (and time-tested) design patterns. Developer Keith Casey introduces 11 design patterns that will help you solve common coding challenges and make your intentions clear to future architects of your application. Keith explores use cases for: Accessing data with the active record and table data gateway patterns Creating objects with the factory, singleton, and mock objects patterns Extending code with decorator and adapter patterns Structuring applications with MVC and Action-Domain-Responder patterns Each chapter features a design pattern in a real-world coding scenario, and closes with a practice challenge to test your new skills. Umfang: 01:09:01.00
Inhalt: While many technical professionals claim to know and understand OAuth, reality often suggests otherwise. Implementing the proper grant types and the required flows while securely protecting your secrets is challenging at best and catastrophic at worst. Fundamentally, professionals often struggle with OAuth because they misunderstand what it is, what use cases it is particularly good and bad at, and how to integrate it smoothly and safely into their systems. In this course, Keith Casey reviews the basics of OAuth 2.0 and OpenID Connect and shows how to use them to authenticate your applications. He covers tokens and scopes; designing and building the key flows; common security considerations; and more. Umfang: 01:44:31.00
Inhalt: While many technical professionals claim to know and understand OAuth, reality often suggests otherwise. Implementing the proper grant types and the required flows while securely protecting your secrets is challenging at best and catastrophic at worst. Fundamentally, professionals often struggle with OAuth because they misunderstand what it is, what use cases it is particularly good and bad at, and how to integrate it smoothly and safely into their systems. In this course, review the basics of OAuth 2.0 and OpenID Connect, and learn how to use them to authenticate your applications. Learn about tokens, scopes, and claims; OAuth flows; common security considerations; and more. Umfang: 01:26:18.00
Programm Findus Internet-OPAC findus.pl V20.235/8 auf Server windhund2.findus-internet-opac.de,
letztes Datenbankupdate: 09.05.2024, 11:57 Uhr. 962 Zugriffe im Mai 2024. Insgesamt 511.192 Zugriffe seit Januar 2009
Mobil - Impressum - Datenschutz - CO2-Neutral