Flylib.com
Mongrel. Serving, Deploying, and Extending Your Ruby Applications
Mongrel. Serving, Deploying, and Extending Your Ruby Applications
ISBN: 9812836357
EAN: N/A
Year: 2006
Pages: 48
BUY ON AMAZON
Mongrel: Serving, Deploying, and Extending Your Ruby Applications
Table of Contents
Copyright
Section 1. What This Short Cut Covers
Section 1.1. The Format of This Short Cut
Section 1.2. Zed Sez
Section 2. Introduction
Section 2.1. What Is Mongrel?
Section 2.2. How Does Mongrel Work?
Section 2.3. What Can Mongrel Do for Me?
Section 3. Getting Started
Section 3.1. Installing Mongrel
Section 3.2. Using Mongrel
Section 3.3. Supported Platforms
Section 3.4. Supported Frameworks
Section 4. Configurations
Section 4.1. Configuring Mongrel
Section 4.2. Common Configurations
Section 4.3. Hit the Ground Running: Example Configurations
Section 5. Production Deployment
Section 5.1. Requirements
Section 5.2. (Too) Many Options
Section 5.3. Fake Hardware Layout
Section 5.4. Software Deployment
Section 5.5. Configuration
Section 5.6. Care and Feeding
Section 6. Extending Mongrel
Section 6.1. Mongrel s Architecture
Section 6.2. Handlers
Section 6.3. Filters
Section 6.4. Distributing Your Plugins as RubyGems
Section 6.5. Commands
Section 6.6. Handlers as GemPlugins
Section 6.7. Advanced Handlers
Section 6.8. Finding More Plugins
Section 7. Debugging
Section 7.1. Available Tools
Section 7.2. Common Scenarios
Section 7.3. Other Tools
Section 7.4. Reporting Mongrel Bugs
Section 8. Performance
Section 8.1. A Simple Process for Tuning Your First Deployment
Section 9. Security
Section 9.1. Mongrel s Security Design
Resources
Acknowledgments
About the Authors
Mongrel. Serving, Deploying, and Extending Your Ruby Applications
ISBN: 9812836357
EAN: N/A
Year: 2006
Pages: 48
BUY ON AMAZON
Lotus Notes and Domino 6 Development (2nd Edition)
Creating Reusable Design Objects
Adding and Editing View Columns
Understanding the Basics of HTML
Data Connection Resources
Analyzing Domino Applications
The CISSP and CAP Prep Guide: Platinum Edition
Information Security and Risk Management
Application Security
Understanding Certification and Accreditation
Appendix A Answers to Assessment Questions
Appendix C The Information System Security Architecture Professional (ISSAP) Certification
Postfix: The Definitive Guide
Postfix and DNS
Simple Mailing Lists
The Nature of Spam
SASL Overview
C.6. Common Problems
C & Data Structures (Charles River Media Computer Engineering)
C Operators
Address and Pointers
Strings
Linked Lists
Graphs
MPLS Configuration on Cisco IOS Software
MPLS Traffic Engineering
Command Reference
Introduction to Layer 2 VPNs
Case Study 1: Implementing Multicast Support for MPLS VPNs
Case Study 7: Implementing Hub and Spoke Topologies with OSPF
Digital Character Animation 3 (No. 3)
Finalizing Your Design
Conclusion
Animating Walks
Insects and Spiders
Other Techniques
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies