Conventions

 In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.

Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "We can achieve this using the <ipSecurity> element."

A block of code is set as follows:

<configuration>  <system.webServer>    <security>      <ipSecurity allowUnlisted="true" denyAction="NotFound">        <add allowed="true" ipAddress="xxx.xxx.xxx.xxx"                subnetMask="255.xxx.xxx.xxx"/>      </ipSecurity>    </security>  </system.webServer></configuration>

When we wish to draw your attention to a particular part ...

Get Implementing DevOps with Microsoft Azure now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.