Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover Page
Half Title
Full Title
Copyright
Contents
Figures & Tables
Note from the Publisher on the Second Edition
Foreword to the Second Edition: Nicole Forsgren
Foreword to the First Edition: John Allspaw
Preface
Introduction
Part I—The Three Ways
Part I Introduction
01: Agile, Continuous Delivery, and the Three Ways
02: The First Way: The Principles of Flow
03: The Second Way: The Principles of Feedback
04: The Third Way: The Principles of Continual Learning and Experimentation
Part 1 Conclusion
Part II—Where to Start
Part II Introduction
05: Selecting Which Value Stream to Start With
06: Understanding the Work in Our Value Stream, Making it Visible, and Expanding it Across the Organization
07: How to Design Our Organization and Architecture with Conway’s Law in Mind
08: How to Get Great Outcomes by Integrating Operations into the Daily Work of Development
Part II Conclusion
Part III—The First Way: The Technical Practices of Flow
Part III Introduction
09: Create the Foundations of Our Deployment Pipeline
10: Enable Fast and Reliable Automated Testing
11: Enable and Practice Continuous Integration
12: Automate and Enable Low-Risk Releases
13: Architect for Low-Risk Releases
Part III Conclusion
Part IV—The Second Way: The Technical Practices of Feedback
Part IV Introduction
14: Create Telemetry to Enable Seeing and Solving Problems
15: Analyze Telemetry to Better Anticipate Problems and Achieve Goals
16: Enable Feedback So Development and Operations Can Safely Deploy Code
17: Integrate Hypothesis-Driven Development and A/B Testing into Our Daily Work
18: Create Review and Coordination Processes to Increase Quality of Our Current Work
Part IV Conclusion
Part V—The Third Way: The Technical Practices of Continual Learning and Experimentation
Part V Introduction
19: Enable and Inject Learning into Daily Work
20: Convert Local Discoveries into Global Improvements
21: Reserve Time to Create Organizational Learning and Improvement
Part V Conclusion
Part VI—The Technological Practices of Integrating Information Security, Change Management, and Compliance
Part VI Introduction
22: Information Security Is Everyone’s Job Every Day
23: Protecting the Deployment Pipeline
Part VI Conclusion
A Call to Action: Conclusion to The DevOps Handbook
Afterword to the Second Edition
Appendices
Bibliography
Notes
Index
Acknowledgments
About the Authors
← Prev
Back
Next →
← Prev
Back
Next →