Cargando…

Kubernetes security : operating Kubernetes clusters and applications safely /

Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This practical ebook walks you through Kubernetes security features--including when to use what--and shows yo...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Rice, Liz (Autor), Hausenblas, Michael (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, 2018.
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1083130710
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 190122s2018 caua o 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d STF  |d MERER  |d OCLCF  |d OCLCQ  |d CZL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |z 9781492039068 
029 1 |a AU@  |b 000069004305 
035 |a (OCoLC)1083130710 
037 |a CL0501000019  |b Safari Books Online 
050 4 |a QA76.9.D5 
049 |a UAMI 
100 1 |a Rice, Liz,  |e author. 
245 1 0 |a Kubernetes security :  |b operating Kubernetes clusters and applications safely /  |c Liz Rice and Michael Hausenblas. 
250 |a First edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media,  |c 2018. 
264 4 |c ©2018 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed January 17, 2019). 
520 |a Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This practical ebook walks you through Kubernetes security features--including when to use what--and shows you how to augment those features with container image best practices and secure network communication. Liz Rice from Aqua Security and Michael Hausenblas from Red Hat not only describe practical security techniques for Kubernetes but also maintain an accompanying website. Developers will learn how to build container images with security in mind, and ops folks will pick up techniques for configuring and operating a Kubernetes cluster more securely. Explore security concepts including defense in depth, least privilege, and limiting the attack surface Safeguard clusters by securing worker nodes and control plane components, such as the API server and the etcd key value store Learn how Kubernetes uses authentication and authorization to grant fine-grained access Secure container images against known vulnerabilities and abuse by third parties Examine security boundaries and policy enforcement features for running containers securely Learn about the options for handling secret information such as credentials Delve into advanced topics such as monitoring, alerting, and auditing, as well as sandboxing and runtime protection. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Electronic data processing  |x Distributed processing. 
650 0 |a Application software  |x Development. 
650 0 |a Open source software. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Traitement réparti. 
650 6 |a Logiciels d'application  |x Développement. 
650 6 |a Logiciels libres. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Application software  |x Development  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Electronic data processing  |x Distributed processing  |2 fast 
650 7 |a Open source software  |2 fast 
700 1 |a Hausenblas, Michael,  |e author. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781492039075/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP