"Redis real" easy to introduce five kinds of data types Redis, and shows the use of a plurality of Redis by practical examples.
In addition, the book also tells the story of optimization methods and extension methods Redis is a reference book to learn and use Redis is rare.
"Redis real" total consists of three parts.
Part of Redis introduced, explained the basics of using Redis, it has five kinds of data structures and operations command these five data structures, and explains how to use Redis to build article shows website, cookie, shopping cart, web cache, cache-line database and a series of procedures.
The second part of the Redis commands in more detail, and shows how to use Redis to build more complex auxiliary tools and applications, and at the end shows how to use Redis to build a simple social networking site.
The third part of the questions Redis users often encounter were introduced to explain the method of reducing the Redis memory footprint, the way to extend the performance and methods of using Redis Lua scripting language.
Summary dedicated translator preface the Translator preface Preface Acknowledgments About the Book About the picture the first part of the entry 1.1 Redis Introduction and compared to other databases and software Redis 1.1.1 1.1.2 additional features reason to use the Redis 1.1.3 1.2 Redis data structure Introduction 1.2.1 Redis strings in the list in 1.2.2 Redis 1.2.3 Redis collection 1.2.4 Redis hash 1.2.5 Redis sorted set 1.3 Hello 1.3.1 vote on article 1.3. 2 and get articles published 1.3.3 of articles grouped 1.4 help 1.5 Summary Chapter 2 Redis building Web applications using the 2.1 login cookie cache and 2.2 use Redis realize cart 2.3 Web cache 2.4 data line buffer 2.5 web analytics 2.6 Summary of the second part of the core concepts Chapter 3 Redis commands 3.1 string 3.2 list 3.3 collection 3.4 Hash 3.5 ordered collection of 3.6 Publish and Subscribe 3.7 Other commands 3.7.1 Sorting 3.7.2 basic affairs Redis 3.7.3 key expiration time 3.8 Summary Chapter 4, data security and performance guarantees 4.1 persistence options snapshot 4.1.1 persistence 4.1.2 AOF persistence 4.1.3 rewrite / AOF compressed files 4.2 copying 4.2.1 configuration Redis configuration options boot process 4.2.2 Redis copy of 4.2.3 from the main chain 4.2.4 test disk write 4.3 processing system failures 4.3.1 snapshot file and verify AOF file 4.3.2 * change failed primary server 4.4 Redis transaction 4.4.1 user information and user defined parcels 4.4.2 the article put on the market 4.4.3 purchase items 4.5 non-transactional pipeline 4.6 Notes on performance 4.7 Summary Chapter 5 build support program using Redis 5.1 logs to use Redis 5.1.1 the latest log 5.1.2 common log 5.2 counters and statistics 5.2.1 store the counter inside the Redis 5.2.2 using Redis store statistics record 5.2.3 simplify statistical data and found that 5.3 belongs to the city and find the IP ** 5.3.1 loading position table 5.3.2 find a city-owned IP 5.4 service discovery and configuration 5.4.1 use Redis to store configuration information 5.4.2 for each application component separately configure a Redis server 5.4.3 connection Manager automatically Redis 5.5 Summary Chapter 6 to build application components using Redis 6.1 auto-completion 6.1.1 auto-complete * close contacts 6.1.2 auto-complete address book 6.2 distributed lock importance 6.2.1 lock 6.2.2 easy lock 6.2.3 lock constructed using Redis 6.2.4 fine-grained lock lock 6.2.5 with timeout limit characteristics of counting semaphores 6.3 6.3.1 build basic counting semaphore 6.3.2 fair semaphore 6.3.3 refresh semaphore 6.3.4 eliminate race conditions 6.4 task queue 6.4.1 FIFO dequeue 6.4.2 delay tasks 6.5 pull message 6.5.1 single transmission recipient of the message subscription alternatives 6.5.2 multi-recipient message and sending subscription alternatives 6.6 using distributed files Redis 6.6.1 user based on location data polymerizable 6.6.2 send log files 6.6.3 receive log files 6.6.4 log files 6.7 Summary Chapter 7-based applications search 7.1 search using Redis 7.1.1 the basic principles of search 7.1.2 to sort search results 7.2 ordered indexes 7.2.1 using the set of ordered pairs Search results are sorted 7.2.2 achieve an ordered set of non-numeric ordering 7.3 ad targeting 7.3.1 What is an ad server? 7.3.2 the ad index 7.3.3 to perform ad targeting operations 7.3.4 learn from user behavior 7.4 Job Search 7.4.1 one by one to find the right job 7.4.2 to search for ways to find a suitable position 7.5 Summary Chapter 8 build simple social networking sites 8.1 users and status 8.1.1 user information 8.1.2 status messages 8.2 Home timeline 8.3 is concerned about the list and watchlist 8.4 release status messages and delete 8.5 stream data stream provided by the API 8.5.1 8.5.2 provides data 8.5.3 convection filter messages 8.6 Summary third portion advanced content Chapter 9 to reduce the memory footprint 9.1 short structure 9.1.1 compression listing represents an integer of encoding a set of collections 9.1.2 9.1.3 length compression and a large list of integers performance issues with 9.2 slice structure 9.2.1 sliced hash 9.2.2 slice set 9.3 packed and byte storage bins 9.3.1 format is determined storage location information data storage packed 9.3.2 9.3 .3 slice strings polymerization calculate 9.4 brief summary chapter 10 extend 10.1 extended read performance 10.2 expanded write performance and memory capacity 10.2.1 fragments configuration information 10.2.2 slice up the server is connected to decorative complex query extensions 10.3 10.3.1 extended search query volume 10.3.2 extended search index size 10.3.3 on social networking sites to expand 10.4 Summary Chapter 11 Redis Lua scripting of 11.1 to add new features without writing C code 11.1.1 will Lua script Loading 11.1.2 create a new status message 11.2 Using Lua rewrite locks and semaphores reasons 11.2.1 using Lua achieve lock 11.2.2 rewrite locks for 11.2.3 use Lua implements counting semaphores 11.3 remove WATCH / MULTI / EXEC transaction 11.3.1 review group auto-completion program 11.3.2 sale of goods on the market again improved Lua list 11.4 fragmentation constituting the fragment list 11.4.1 11.4.2 push the fragment list element 11.4.3 slice from the pop-up element inside which 11.4.4 eject operation is performed on the blocking fragment list 11.5 Summary Exhibit a quick installation Appendix B other resources and references Appendix A Quick installation Guide Appendix B to other resources and reference materials
download link
https://pan.baidu.com/s/1hC_udW6CqRIk8BJd2H3kBw
-
To extract the code:
[Micro channel Open] -> [Scan under Fanger Wei code] -> [person concerned data] input "600003" Get extraction code
Adhere to electronic books sharing of resources, thanks to agree!
If you cancel the public attention this number, even if attention once again, will not be able to provide this service, remember to remember.