|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1139722891 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
200207s2019 caua o 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d CZL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|z 9781492082521
|
035 |
|
|
|a (OCoLC)1139722891
|
037 |
|
|
|a CL0501000096
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Podjarny, Guy,
|e author.
|
245 |
1 |
0 |
|a Serverless security :
|b protect functions using the CLAD security model /
|c Guy Podjarny and Liran Tal.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media, Inc.,
|c 2019.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (viewed February 7, 2020).
|
520 |
|
|
|a Serverless is taking the cloud native world by storm. This new approach promises extraordinary value, from increased developer productivity to dramatic cost savings. In some aspects, serverless also boasts significant security advantages compared to the server model. But as this practical report explains, securing serverless still requires diligence from the developers and application security professionals involved in the process. Guy Podjarny and Liran Tal from Snyk examine the significant benefits that serverless brings to application security, as well as the considerable risks involved when you configure a serverless system. You'll also learn a platform-agnostic security model known as CLAD that will help you address C ode vulnerabilities, L ibrary vulnerabilities, A ccess and permissions, and D ata security. This report helps you: Understand what serverless is and how this model evolved from cloud native processes Explore the three primary areas where serverless improves security Learn how the CLAD model provides four categories to help you home in on specific security issues Follow a detailed example that demonstrates how poor security manifests in real-world serverless applications.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Cloud computing.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Infonuagique.
|
650 |
|
7 |
|a Cloud computing
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Ṭal, Liran,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781492082538/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|