Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Software Architecture with C++

You're reading from  Software Architecture with C++

Product type Book
Published in Apr 2021
Publisher Packt
ISBN-13 9781838554590
Pages 540 pages
Edition 1st Edition
Languages
Authors (2):
Adrian Ostrowski Adrian Ostrowski
Profile icon Adrian Ostrowski
Piotr Gaczkowski Piotr Gaczkowski
Profile icon Piotr Gaczkowski
View More author details
Toc

Table of Contents (24) Chapters close

Preface 1. Section 1: Concepts and Components of Software Architecture
2. Importance of Software Architecture and Principles of Great Design 3. Architectural Styles 4. Functional and Nonfunctional Requirements 5. Section 2: The Design and Development of C++ Software
6. Architectural and System Design 7. Leveraging C++ Language Features 8. Design Patterns and C++ 9. Building and Packaging 10. Section 3: Architectural Quality Attributes
11. Writing Testable Code 12. Continuous Integration and Continuous Deployment 13. Security in Code and Deployment 14. Performance 15. Section 4: Cloud-Native Design Principles
16. Service-Oriented Architecture 17. Designing Microservices 18. Containers 19. Cloud-Native Design 20. Assessments 21. About Packt 22. Other Books You May Enjoy Appendix A

The network is secure

This is a dangerous fallacy. A chain is only as strong as its weakest link, and unfortunately, there are many links in distributed systems. Here are a few ways to make those links stronger:

  • Be sure to always apply security patches to every component that you use, to your infrastructure, operating systems, and other components.
  • Train your personnel and try to protect your system from the human factor; sometimes it's a rogue employee that compromises a system.
  • If your system will be online, it will get attacked, and it's possible that a breach will happen at one point. Be sure to have a written plan on how to react to such events.
  • You might have heard about the defense in depth principle. It boils down to having different checks for different parts of your system (your infrastructure, your applications, and so on) so that when a breach happens, its range, and the associated damage, will be limited.
  • Use firewalls, certificates, encryption, and proper authentication...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}