Hacking Kubernetes : threat-driven analysis and defense /
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vu...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Sebastapol, CA :
O'Reilly Media,
2021.
|
Edición: | First edition. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Preface
- Chapter 1. Introduction
- Chapter 2. Pod-Level Resources
- Chapter 3. Container Runtime Isolation
- Chapter 4. Applications and Supply Chain
- Chapter 5. Networking
- Chapter 6. Storage
- Chapter 7. Hard Multitenancy
- Chapter 8. Policy
- Chapter 9. Intrusion Detection
- Chapter 10. Organizations
- Appendix A. A Pod-Level Attack
- Appendix B. Resources.