|
|
|
|
LEADER |
00000cam a22000007a 4500 |
001 |
OR_on1264230694 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||||||| |
008 |
210818s2021 xx o 000 0 eng d |
040 |
|
|
|a AU@
|b eng
|c AU@
|d OCLCQ
|d TOH
|d OCLCQ
|
020 |
|
|
|z 9781098101770
|
024 |
8 |
|
|a 9781098101787
|
029 |
0 |
|
|a AU@
|b 000069704557
|
029 |
1 |
|
|a AU@
|b 000073554878
|
035 |
|
|
|a (OCoLC)1264230694
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Dang, Wei,
|e author.
|
245 |
1 |
0 |
|a DevSecOps in Kubernetes /
|c Dang, Wei.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b O'Reilly Media, Inc.,
|c 2021.
|
300 |
|
|
|a 1 online resource (67 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
520 |
|
|
|a Security is now everyone's job. Whether your system is cloud native or lives in the cloud with a traditional architecture, moving off premises has made security more complex than ever. To protect your assets, you should consolidate the groups involved in development, orchestration, and deployment, because they'll all have different insights. If your work touches any part of the software development lifecycle (SDLC), this report is for you. You'll learn how to integrate security measures into software development methodologies and architectural designs. Then you'll discover how DevSecOps helps you embed security into the SDLC to identify and address threats. Make your team and organization stronger, more resilient, and more secure by adopting the DevSecOps mindset. Pick the right team: essential if your cloud native design uses virtualized applications rather than virtualized systems Select the right tools: manage the entire virtualized application lifecycle with Kubernetes Automate everything you can: automation is testable to ensure you're using the right process Verify everything: use humans to confirm that the right things are happening Introduce security early: embed security in developer workflows Identify threats: use threat modeling in your application or system design.
|
542 |
|
|
|f Copyright © O'Reilly Media, Inc.
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
|
|
|a Online resource; Title from title page (viewed July 25, 2021)
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
700 |
1 |
|
|a Kohgadai, Ajmal,
|e author.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781098101787/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|