Cargando…

Serverless security : protect functions using the CLAD security model /

Serverless is taking the cloud native world by storm. This new approach promises extraordinary value, from increased developer productivity to dramatic cost savings. In some aspects, serverless also boasts significant security advantages compared to the server model. But as this practical report exp...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Podjarny, Guy (Autor), Ṭal, Liran (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, Inc., 2019.
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1139722891
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 200207s2019 caua o 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d CZL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |z 9781492082521 
035 |a (OCoLC)1139722891 
037 |a CL0501000096  |b Safari Books Online 
050 4 |a QA76.9.A25 
049 |a UAMI 
100 1 |a Podjarny, Guy,  |e author. 
245 1 0 |a Serverless security :  |b protect functions using the CLAD security model /  |c Guy Podjarny and Liran Tal. 
250 |a First edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media, Inc.,  |c 2019. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (viewed February 7, 2020). 
520 |a Serverless is taking the cloud native world by storm. This new approach promises extraordinary value, from increased developer productivity to dramatic cost savings. In some aspects, serverless also boasts significant security advantages compared to the server model. But as this practical report explains, securing serverless still requires diligence from the developers and application security professionals involved in the process. Guy Podjarny and Liran Tal from Snyk examine the significant benefits that serverless brings to application security, as well as the considerable risks involved when you configure a serverless system. You'll also learn a platform-agnostic security model known as CLAD that will help you address C ode vulnerabilities, L ibrary vulnerabilities, A ccess and permissions, and D ata security. This report helps you: Understand what serverless is and how this model evolved from cloud native processes Explore the three primary areas where serverless improves security Learn how the CLAD model provides four categories to help you home in on specific security issues Follow a detailed example that demonstrates how poor security manifests in real-world serverless applications. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Cloud computing. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Infonuagique. 
650 7 |a Cloud computing  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Ṭal, Liran,  |e author. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781492082538/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP