|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1201201696 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
201021s2020 enka ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d UMI
|d N$T
|d EBLCP
|d UKAHL
|d NLW
|d OCLCO
|d OCLCF
|d YDX
|d OCLCQ
|d OCLCO
|d KSU
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1164826614
|a 1175923814
|
020 |
|
|
|a 1839212187
|
020 |
|
|
|a 9781839212185
|q (electronic bk.)
|
020 |
|
|
|z 9781839216503
|
035 |
|
|
|a (OCoLC)1201201696
|z (OCoLC)1164826614
|z (OCoLC)1175923814
|
037 |
|
|
|a CL0501000158
|b Safari Books Online
|
050 |
|
4 |
|a QA76.76.A65
|
082 |
0 |
4 |
|a 005.3
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Huang, Kaizhe,
|e author.
|
245 |
1 |
0 |
|a Learn Kubernetes security :
|b securely orchestrate, scale, and manage your microservices in Kubernetes deployments /
|c Kaizhe Huang and Pranjal Jumde ; foreword by Loris Degioanni.
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing,
|c 2020.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from cover (Safari, viewed October 20, 2020).
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a Kubernetes is a widely used opensource orchestration platform for managing container applications. Developers are not yet aware of the pitfalls of a containerized environment. This book takes you through core security principles, best practices, and real-world use cases to learn mitigation or prevention strategies from known attacks and CVEs.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Application software
|x Development
|x Automation.
|
650 |
|
0 |
|a Open source software.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Logiciels d'application
|x Développement
|x Automatisation.
|
650 |
|
6 |
|a Logiciels libres.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Operational research.
|2 bicssc
|
650 |
|
7 |
|a Enterprise software.
|2 bicssc
|
650 |
|
7 |
|a Computer programming
|x software development.
|2 bicssc
|
650 |
|
7 |
|a Computer networking & communications.
|2 bicssc
|
650 |
|
7 |
|a Computers
|x Enterprise Applications
|x Business Intelligence Tools.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Software Development & Engineering
|x Tools.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x System Administration
|x Linux & UNIX Administration.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Open source software
|2 fast
|
700 |
1 |
|
|a Jumde, Pranjal,
|e author.
|
700 |
1 |
|
|a Degioanni, Loris,
|e writer of foreword.
|
776 |
0 |
8 |
|i Print version:
|a Huang, Kaizhe.
|t Learn Kubernetes Security : Securely Orchestrate, Scale, and Manage Your Microservices in Kubernetes Deployments.
|d Birmingham : Packt Publishing, Limited, ©2020
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781839216503/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37406766
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6261072
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2521135
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 301372087
|
994 |
|
|
|a 92
|b IZTAP
|