Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Page Half Title Full Title Copyright Contents Figures & Tables Note from the Publisher on the Second Edition Foreword to the Second Edition: Nicole Forsgren Foreword to the First Edition: John Allspaw Preface Introduction Part I—The Three Ways
Part I Introduction 01: Agile, Continuous Delivery, and the Three Ways 02: The First Way: The Principles of Flow 03: The Second Way: The Principles of Feedback 04: The Third Way: The Principles of Continual Learning and Experimentation Part 1 Conclusion
Part II—Where to Start
Part II Introduction 05: Selecting Which Value Stream to Start With 06: Understanding the Work in Our Value Stream, Making it Visible, and Expanding it Across the Organization 07: How to Design Our Organization and Architecture with Conway’s Law in Mind 08: How to Get Great Outcomes by Integrating Operations into the Daily Work of Development Part II Conclusion
Part III—The First Way: The Technical Practices of Flow
Part III Introduction 09: Create the Foundations of Our Deployment Pipeline 10: Enable Fast and Reliable Automated Testing 11: Enable and Practice Continuous Integration 12: Automate and Enable Low-Risk Releases 13: Architect for Low-Risk Releases Part III Conclusion
Part IV—The Second Way: The Technical Practices of Feedback
Part IV Introduction 14: Create Telemetry to Enable Seeing and Solving Problems 15: Analyze Telemetry to Better Anticipate Problems and Achieve Goals 16: Enable Feedback So Development and Operations Can Safely Deploy Code 17: Integrate Hypothesis-Driven Development and A/B Testing into Our Daily Work 18: Create Review and Coordination Processes to Increase Quality of Our Current Work Part IV Conclusion
Part V—The Third Way: The Technical Practices of Continual Learning and Experimentation
Part V Introduction 19: Enable and Inject Learning into Daily Work 20: Convert Local Discoveries into Global Improvements 21: Reserve Time to Create Organizational Learning and Improvement Part V Conclusion
Part VI—The Technological Practices of Integrating Information Security, Change Management, and Compliance
Part VI Introduction 22: Information Security Is Everyone’s Job Every Day 23: Protecting the Deployment Pipeline Part VI Conclusion
A Call to Action: Conclusion to The DevOps Handbook Afterword to the Second Edition Appendices Bibliography Notes Index Acknowledgments About the Authors
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion