|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
OR_on1350746528 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
221114s2022 cau o 000 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|
020 |
|
|
|z 9781098138639
|
029 |
1 |
|
|a AU@
|b 000072937709
|
035 |
|
|
|a (OCoLC)1350746528
|
037 |
|
|
|a 9781098138646
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.76.S58
|
082 |
0 |
4 |
|a 005.1/12
|2 23/eng/20221114
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Crawley, Kim,
|e author.
|
245 |
1 |
0 |
|a Zero trust architecture in Kubernetes /
|c Kim Crawley.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media, Inc.,
|c 2022.
|
300 |
|
|
|a 1 online resource (50 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Zero trust is a security framework that relies on authenticating, authorizing, and continuously validating access for every transaction. For organizations that use Kubernetes to develop and deliver applications, zero trust is the only practical way to keep your systems safe from potential external and internal threats. This insightful report provides a high-level overview of what zero trust in Kubernetes looks like and why it's so important. Author Kim Crawley explains considerations specific to Kubernetes and describes best practices for implementing a zero trust model. With this architecture, all components in your Kubernetes system will be secured by default; no endpoint, server, application, or service will interact with anything else without proper authentication, authorization, and nonrepudiation. You'll learn how to: Secure computer systems with effective authentication and authorization functionality Use integrity verification to secure Kubernetes applications in zero trust architecture Create an observable state in your Kubernetes network for robust security monitoring Establish an effective zero trust architecture to run Kubernetes Initiate time management in a Kubernetes implementation Apply role-based access control to your Kubernetes network Establish end-to-end encryption for zero trust security Explore effective zero trust security scenarios with Kubernetes.
|
588 |
0 |
|
|a Online resource; title from title details screen (O'Reilly, viewed November 14, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Kubernetes.
|
650 |
|
0 |
|a Modular programming
|x Computer programs.
|
650 |
|
0 |
|a Global software development
|x Computer programs.
|
650 |
|
0 |
|a Open source software.
|
650 |
|
0 |
|a Component software.
|
650 |
|
7 |
|a Component software.
|2 fast
|0 (OCoLC)fst00871617
|
650 |
|
7 |
|a Open source software.
|2 fast
|0 (OCoLC)fst01046097
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781098138646/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|