Cargando…

Cloud Native Application Security /

Cloud native applications do more than just run on a different platform. The entire scope of these applications is different, including the methodologies and skills used to build them. Security practices for these applications need a transformation of equal magnitude. With this report, you'll l...

Descripción completa

Detalles Bibliográficos
Autor principal: Podjarny, Guy (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico eBook
Idioma:Inglés
Publicado: O'Reilly Media, Inc., 2021.
Edición:1st edition.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1258251746
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 180521s2021 xx go 000 0 eng d
040 |a TOH  |b eng  |c TOH  |d AU@  |d OCLCO  |d OCLCQ  |d TOH  |d OCLCQ 
019 |a 1256712948 
020 |a 9781098105631 
020 |a 109810563X 
020 |z 9781098105624 
024 8 |a 9781098105631 
029 1 |a AU@  |b 000069346983 
029 1 |a AU@  |b 000073555956 
035 |a (OCoLC)1258251746  |z (OCoLC)1256712948 
049 |a UAMI 
100 1 |a Podjarny, Guy,  |e author. 
245 1 0 |a Cloud Native Application Security /  |c Podjarny, Guy. 
250 |a 1st edition. 
264 1 |b O'Reilly Media, Inc.,  |c 2021. 
300 |a 1 online resource (55 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
365 |b 74.99 
520 |a Cloud native applications do more than just run on a different platform. The entire scope of these applications is different, including the methodologies and skills used to build them. Security practices for these applications need a transformation of equal magnitude. With this report, you'll learn how to adapt your practices to this new organizational reality by adopting a developer-first cloud native application security (CNAS) approach. Author Guy Podjarny explains this market transition and guides you through the organizational changes required to succeed, including alterations to security practices and tooling. Concrete examples not only help you learn the concepts but also act as an ideal way to get started in the process. By the end of this report, you'll understand why and how to embrace a CNAS approach. Initiate dev-first security by equipping developers with the mandate and tools to secure what they build during the development process Expand the scope of application security for cloud native apps to include controls that IT security previously handled Learn how adopting CNAS requires significant changes to the way you secure applications and infrastructure Adapt your organization to a dev-first CNAS approach by rethinking your security organizational structure, tooling, and priorities. 
542 |f Copyright © O'Reilly Media, Inc. 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 0 |a Online resource; Title from title page (viewed June 25, 2021). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
710 2 |a O'Reilly for Higher Education (Firm),  |e distributor. 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781098105631/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP