redis actual pdf download the full version of PDF HD

"Redis real" easy to introduce five kinds of data types Redis, and shows the use of a plurality of Redis by practical examples.

In addition, the book also tells the story of optimization methods and extension methods Redis is a reference book to learn and use Redis is rare.
"Redis real" total consists of three parts.

Part of Redis introduced, explained the basics of using Redis, it has five kinds of data structures and operations command these five data structures, and explains how to use Redis to build article shows website, cookie, shopping cart, web cache, cache-line database and a series of procedures.

The second part of the Redis commands in more detail, and shows how to use Redis to build more complex auxiliary tools and applications, and at the end shows how to use Redis to build a simple social networking site.

The third part of the questions Redis users often encounter were introduced to explain the method of reducing the Redis memory footprint, the way to extend the performance and methods of using Redis Lua scripting language.

 

Summary 
dedicated 
translator preface 
the Translator 
preface 
Preface 
Acknowledgments 
About the Book 
About the picture 
the first part of the entry 
1.1 Redis Introduction 
and compared to other databases and software Redis 1.1.1 
1.1.2 additional features 
reason to use the Redis 1.1.3 
1.2 Redis data structure Introduction 
1.2.1 Redis strings in 
the list in 1.2.2 Redis 
1.2.3 Redis collection 
1.2.4 Redis hash 
1.2.5 Redis sorted set 
1.3 Hello 
1.3.1 vote on article 
1.3. 2 and get articles published 
1.3.3 of articles grouped 
1.4 help 
1.5 Summary 
Chapter 2 Redis building Web applications using the 
2.1 login cookie cache and 
2.2 use Redis realize cart 
2.3 Web cache 
2.4 data line buffer 
2.5 web analytics 
2.6 Summary 
of the second part of the core concepts 
Chapter 3 Redis commands  
3.1 string
3.2 list 
3.3 collection 
3.4 Hash 
3.5 ordered collection of 
3.6 Publish and Subscribe 
3.7 Other commands 
3.7.1 Sorting 
3.7.2 basic affairs Redis 
3.7.3 key expiration time 
3.8 Summary 
Chapter 4, data security and performance guarantees 
4.1 persistence options 
snapshot 4.1.1 persistence 
4.1.2 AOF persistence 
4.1.3 rewrite / AOF compressed files 
4.2 copying 
4.2.1 configuration Redis configuration options 
boot process 4.2.2 Redis copy of 
4.2.3 from the main chain 
4.2.4 test disk write 
4.3 processing system failures 
4.3.1 snapshot file and verify AOF file 
4.3.2 * change failed primary server 
4.4 Redis transaction 
4.4.1 user information and user defined parcels 
4.4.2 the article put on the market 
4.4.3 purchase items 
4.5 non-transactional pipeline 
4.6 Notes on performance 
4.7 Summary 
Chapter 5 build support program using Redis 
5.1 logs to use Redis 
5.1.1 the latest log 
5.1.2 common log 
5.2 counters and statistics 
5.2.1 store the counter inside the Redis 
5.2.2 using Redis store statistics 
record 5.2.3 simplify statistical data and found that 
5.3 belongs to the city and find the IP ** 
5.3.1 loading position table 
5.3.2 find a city-owned IP 
5.4 service discovery and configuration 
5.4.1 use Redis to store configuration information 
5.4.2 for each application component separately configure a Redis server 
5.4.3 connection Manager automatically Redis 
5.5 Summary 
Chapter 6 to build application components using Redis 
6.1 auto-completion 
6.1.1 auto-complete * close contacts 
6.1.2 auto-complete address book 
6.2 distributed lock 
importance 6.2.1 lock 
6.2.2 easy lock 
6.2.3 lock constructed using Redis 
6.2.4 fine-grained lock 
lock 6.2.5 with timeout limit characteristics of 
counting semaphores 6.3 
6.3.1 build basic counting semaphore 
6.3.2 fair semaphore 
6.3.3 refresh semaphore 
6.3.4 eliminate race conditions 
6.4 task queue 
6.4.1 FIFO dequeue 
6.4.2 delay tasks 
6.5 pull message
6.5.1 single transmission recipient of the message subscription alternatives 
6.5.2 multi-recipient message and sending subscription alternatives 
6.6 using distributed files Redis 
6.6.1 user based on location data polymerizable 
6.6.2 send log files 
6.6.3 receive log files 
6.6.4 log files 
6.7 Summary 
Chapter 7-based applications search 
7.1 search using Redis 
7.1.1 the basic principles of search 
7.1.2 to sort search results 
7.2 ordered indexes 
7.2.1 using the set of ordered pairs Search results are sorted 
7.2.2 achieve an ordered set of non-numeric ordering 
7.3 ad targeting 
7.3.1 What is an ad server? 
7.3.2 the ad index 
7.3.3 to perform ad targeting operations 
7.3.4 learn from user behavior 
7.4 Job Search 
7.4.1 one by one to find the right job 
7.4.2 to search for ways to find a suitable position 
7.5 Summary 
Chapter 8 build simple social networking sites 
8.1 users and status 
8.1.1 user information 
8.1.2 status messages 
8.2 Home timeline 
8.3 is concerned about the list and watchlist 
8.4 release status messages and delete 
8.5 stream 
data stream provided by the API 8.5.1 
8.5.2 provides data 
8.5.3 convection filter messages 
8.6 Summary 
third portion advanced content 
Chapter 9 to reduce the memory footprint 
9.1 short structure 
9.1.1 compression listing represents 
an integer of encoding a set of collections 9.1.2 
9.1.3 length compression and a large list of integers performance issues with 
9.2 slice structure 
9.2.1 sliced hash 
9.2.2 slice set 
9.3 packed and byte storage bins 
9.3.1 format is determined storage location information 
data storage packed 9.3.2 
9.3 .3 slice strings polymerization calculate 
9.4 brief summary 
chapter 10 extend 
10.1 extended read performance 
10.2 expanded write performance and memory capacity 
10.2.1 fragments configuration information 
10.2.2 slice up the server is connected to decorative 
complex query extensions 10.3 
10.3.1 extended search query volume 
10.3.2 extended search index size 
10.3.3 on social networking sites to expand 
10.4 Summary 
Chapter 11 Redis Lua scripting of 
11.1 to add new features without writing C code 
11.1.1 will Lua script Loading 
11.1.2 create a new status message
11.2 Using Lua rewrite locks and semaphores 
reasons 11.2.1 using Lua achieve lock
11.2.2 rewrite locks for 
11.2.3 use Lua implements counting semaphores 
11.3 remove WATCH / MULTI / EXEC transaction 
11.3.1 review group auto-completion program 
11.3.2 sale of goods on the market again improved 
Lua list 11.4 fragmentation 
constituting the fragment list 11.4.1 
11.4.2 push the fragment list element 
11.4.3 slice from the pop-up element inside which 
11.4.4 eject operation is performed on the blocking fragment list 
11.5 Summary 
Exhibit a quick installation 
Appendix B other resources and references 
Appendix A Quick installation Guide 
Appendix B to other resources and reference materials

 

 

download link

https://pan.baidu.com/s/1hC_udW6CqRIk8BJd2H3kBw

  • To extract the code:

    [Micro channel Open] -> [Scan under Fanger Wei code] -> [person concerned data] input "600003" Get extraction code 

    Adhere to electronic books sharing of resources, thanks to agree!

    If you cancel the public attention this number, even if attention once again, will not be able to provide this service, remember to remember.

Guess you like

Origin www.cnblogs.com/sunkang-dba/p/12670245.html