Chapter 1. Getting to know Redis
Table 1.1. Features and functionality of some databases and cache servers
Table 1.2. The five structures available in Redis
Table 1.3. Commands used on STRING values
Table 1.4. Commands used on LIST values
Table 1.5. Commands used on SET values
Chapter 2. Anatomy of a Redis web application
Table 2.1. Pros and cons of signed cookies and token cookies
Chapter 3. Commands in Redis
Table 3.1. Increment and decrement commands in Redis
Table 3.2. Substring manipulation commands available to Redis
Table 3.3. Some commonly used LIST commands
Table 3.4. Some LIST commands for blocking LIST pops and moving items between LISTs
Table 3.5. Some commonly used SET commands
Table 3.6. Operations for combining and manipulating SETs in Redis
Table 3.7. Operations for adding and removing items from HASHes
Table 3.8. More bulk operations and STRING-like calls over HASHes
Table 3.9. Some common ZSET commands
Table 3.11. Commands for handling pub/sub in Redis
Chapter 4. Keeping data safe and ensuring performance
Table 4.1. Sync options to use with appendfsync
Chapter 6. Application components in Redis
Table 6.1. Performance of a heavily loaded marketplace over 60 seconds
Table 6.2. Performance of locking over 60 seconds
Table 6.3. Performance of fine-grained locking over 60 seconds
Chapter 11. Scripting Redis with Lua
Table 11.1. Values returned from Lua and what they’re translated into
Table 11.2. Performance of our original lock against a Lua-based lock over 10 seconds
3.136.18.218