|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
OR_on1310473490 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
220412s2022 caua o 000 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCO
|d OCLCF
|d OCLCQ
|d OCLCO
|
020 |
|
|
|z 9781492096702
|
029 |
1 |
|
|a AU@
|b 000071547132
|
035 |
|
|
|a (OCoLC)1310473490
|
037 |
|
|
|a 9781492096719
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.76.A65
|
082 |
0 |
4 |
|a 005.3
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Salazar, Jed,
|e author.
|
245 |
1 |
0 |
|a Security Observability with eBPF /
|c by Jed Salazar and Natalia Reka Ivanko.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media, Inc.,
|c 2022.
|
300 |
|
|
|a 1 online resource (65 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Kubernetes has become the de facto cloud operating system, making it a rich target for both passive and direct attackers. In fact, the largest concern most organizations have with Kubernetes is securing their production environments. But Kubernetes doesn't include observability or a default security configuration to discern if your pods or clusters have been attacked or compromised. With this report, authors Jed Salazar and Natalia Reka Ivanko help you discover how secure your Kubernetes environment actually is. Using the new eBPF security observability paradigm, security and DevOps teams, SREs, cloud engineers, and solution architects will gain real-time visibility into Kubernetes security. You'll learn how eBPF provides historical and current metrics to help you track improvements and degradations over time.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Application software
|x Development
|x Automation.
|
650 |
|
0 |
|a Open source software.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Logiciels d'application
|x Développement
|x Automatisation.
|
650 |
|
6 |
|a Logiciels libres.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Open source software
|2 fast
|
700 |
1 |
|
|a Ivanko, Natalia Reka,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781492096719/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|