|
|
|
|
LEADER |
00000cgm a22000007a 4500 |
001 |
OR_on1277512206 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cnu|||||||| |
007 |
vz czazuu |
008 |
041021s2021 xx --- o vleng d |
040 |
|
|
|a AU@
|b eng
|c AU@
|d NZCPL
|d OCLCO
|d OCLCF
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1292697524
|a 1305902328
|
020 |
|
|
|z 0636920625353
|
024 |
8 |
|
|a 0636920625377
|
029 |
0 |
|
|a AU@
|b 000070046422
|
035 |
|
|
|a (OCoLC)1277512206
|z (OCoLC)1292697524
|z (OCoLC)1305902328
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Newman, Sam,
|e author.
|
245 |
1 |
0 |
|a Infrastructure & Ops Superstream Series :
|b Building Security Into Your Development Lifecycle /
|c Newman, Sam.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b O'Reilly Media, Inc.,
|c 2021.
|
300 |
|
|
|a 1 online resource (1 video file, approximately 3 hr., 12 min.)
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a video file
|
520 |
|
|
|a Sponsored by Aqua and Palo Alto Networks Security can't be added in at the end. We need to build it into everything we do ("pull left"). So how can developers get involved in building safer, more secure software? And what new skills do you need to learn to do so? About the Infrastructure & Ops Superstream Series: This five-part series of half-day online events details what you need to know to effectively manage existing legacy systems while migrating to modern, scalable, cost-effective infrastructures--with no interruption to your business. Each event day covers some of the most challenging and promising topics facing those working in infrastructure and operations today: continuous integration and delivery, cloud delivery, Kubernetes, microservices, and security. What you'll learn and how you can apply it Discover which tools work best for responding to threats Understand how to develop a cybersecurity strategy Learn how to recover from an attack on Kubernetes This recording of a live event is for you because ... You need to protect your systems from attacks by ransomware and emerging threats. You want to better understand the emerging threats landscape and what you can do to minimize and respond to attacks. You work with distributed systems and want to learn how to secure containers and Kubernetes. Recommended follow-up: Read " Security, Permissions, and Privacy " (chapter 9 in Learning Serverless) Read Kubernetes Security and Observability (early release book) Read Hacking Kubernetes (early release book) Read " Security and Backups " (chapter 11 in Cloud Native DevOps with Kubernetes) Read Building Microservices, second edition (book) Read Learning DevSecOps (early release book) Take Kubernetes Fundamentals in 3 Weeks (live online training course with Jon Johnson)
|
542 |
|
|
|f Copyright © O'Reilly Media, Inc.
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
|
|
|a Online resource; Title from title screen (viewed September 29, 2021)
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
700 |
1 |
|
|a McCune, Rory,
|e author.
|
700 |
1 |
|
|a Smith, Taylor,
|e author.
|
700 |
1 |
|
|a Look, Ping,
|e author.
|
700 |
1 |
|
|a Cochran, Chris,
|e author.
|
700 |
1 |
|
|a Ṭal, Liran,
|e author.
|
700 |
1 |
|
|a Salazar, Jed,
|e author.
|
700 |
1 |
|
|a Ivánkó, Natália,
|e author.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/0636920625377/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|