|
|
|
|
LEADER |
00000cam a22000007a 4500 |
001 |
OR_on1258251746 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
180521s2021 xx go 000 0 eng d |
040 |
|
|
|a TOH
|b eng
|c TOH
|d AU@
|d OCLCO
|d OCLCQ
|d TOH
|d OCLCQ
|
019 |
|
|
|a 1256712948
|
020 |
|
|
|a 9781098105631
|
020 |
|
|
|a 109810563X
|
020 |
|
|
|z 9781098105624
|
024 |
8 |
|
|a 9781098105631
|
029 |
1 |
|
|a AU@
|b 000069346983
|
029 |
1 |
|
|a AU@
|b 000073555956
|
035 |
|
|
|a (OCoLC)1258251746
|z (OCoLC)1256712948
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Podjarny, Guy,
|e author.
|
245 |
1 |
0 |
|a Cloud Native Application Security /
|c Podjarny, Guy.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b O'Reilly Media, Inc.,
|c 2021.
|
300 |
|
|
|a 1 online resource (55 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
365 |
|
|
|b 74.99
|
520 |
|
|
|a Cloud native applications do more than just run on a different platform. The entire scope of these applications is different, including the methodologies and skills used to build them. Security practices for these applications need a transformation of equal magnitude. With this report, you'll learn how to adapt your practices to this new organizational reality by adopting a developer-first cloud native application security (CNAS) approach. Author Guy Podjarny explains this market transition and guides you through the organizational changes required to succeed, including alterations to security practices and tooling. Concrete examples not only help you learn the concepts but also act as an ideal way to get started in the process. By the end of this report, you'll understand why and how to embrace a CNAS approach. Initiate dev-first security by equipping developers with the mandate and tools to secure what they build during the development process Expand the scope of application security for cloud native apps to include controls that IT security previously handled Learn how adopting CNAS requires significant changes to the way you secure applications and infrastructure Adapt your organization to a dev-first CNAS approach by rethinking your security organizational structure, tooling, and priorities.
|
542 |
|
|
|f Copyright © O'Reilly Media, Inc.
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
0 |
|
|a Online resource; Title from title page (viewed June 25, 2021).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
710 |
2 |
|
|a O'Reilly for Higher Education (Firm),
|e distributor.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781098105631/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|