|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1083130710 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
190122s2018 caua o 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d STF
|d MERER
|d OCLCF
|d OCLCQ
|d CZL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|z 9781492039068
|
029 |
1 |
|
|a AU@
|b 000069004305
|
035 |
|
|
|a (OCoLC)1083130710
|
037 |
|
|
|a CL0501000019
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.D5
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Rice, Liz,
|e author.
|
245 |
1 |
0 |
|a Kubernetes security :
|b operating Kubernetes clusters and applications safely /
|c Liz Rice and Michael Hausenblas.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c 2018.
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed January 17, 2019).
|
520 |
|
|
|a Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This practical ebook walks you through Kubernetes security features--including when to use what--and shows you how to augment those features with container image best practices and secure network communication. Liz Rice from Aqua Security and Michael Hausenblas from Red Hat not only describe practical security techniques for Kubernetes but also maintain an accompanying website. Developers will learn how to build container images with security in mind, and ops folks will pick up techniques for configuring and operating a Kubernetes cluster more securely. Explore security concepts including defense in depth, least privilege, and limiting the attack surface Safeguard clusters by securing worker nodes and control plane components, such as the API server and the etcd key value store Learn how Kubernetes uses authentication and authorization to grant fine-grained access Secure container images against known vulnerabilities and abuse by third parties Examine security boundaries and policy enforcement features for running containers securely Learn about the options for handling secret information such as credentials Delve into advanced topics such as monitoring, alerting, and auditing, as well as sandboxing and runtime protection.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Electronic data processing
|x Distributed processing.
|
650 |
|
0 |
|a Application software
|x Development.
|
650 |
|
0 |
|a Open source software.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Traitement réparti.
|
650 |
|
6 |
|a Logiciels d'application
|x Développement.
|
650 |
|
6 |
|a Logiciels libres.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Application software
|x Development
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Electronic data processing
|x Distributed processing
|2 fast
|
650 |
|
7 |
|a Open source software
|2 fast
|
700 |
1 |
|
|a Hausenblas, Michael,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781492039075/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|