×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

Cloud Native Software Security Handbook. Unleash the power of cloud native tools for robust security in modern applications Mihir Shah

(ebook) (audiobook) (audiobook) Książka w języku angielskim
Cloud Native Software Security Handbook. Unleash the power of cloud native tools for robust security in modern applications Mihir Shah - okladka książki

Cloud Native Software Security Handbook. Unleash the power of cloud native tools for robust security in modern applications Mihir Shah - okladka książki

Cloud Native Software Security Handbook. Unleash the power of cloud native tools for robust security in modern applications Mihir Shah - audiobook MP3

Cloud Native Software Security Handbook. Unleash the power of cloud native tools for robust security in modern applications Mihir Shah - audiobook CD

Autor:
Mihir Shah
Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
372
Dostępne formaty:
     PDF
     ePub
For cloud security engineers, it’s crucial to look beyond the limited managed services provided by cloud vendors and make use of the wide array of cloud native tools available to developers and security professionals, which enable the implementation of security solutions at scale. This book covers technologies that secure infrastructure, containers, and runtime environments using vendor-agnostic cloud native tools under the Cloud Native Computing Foundation (CNCF).
The book begins with an introduction to the whats and whys of the cloud native environment, providing a primer on the platforms that you’ll explore throughout. You’ll then progress through the book, following the phases of application development. Starting with system design choices, security trade-offs, and secure application coding techniques that every developer should be mindful of, you’ll delve into more advanced topics such as system security architecture and threat modelling practices. The book concludes by explaining the legal and regulatory frameworks governing security practices in the cloud native space and highlights real-world repercussions that companies have faced as a result of immature security practices.
By the end of this book, you'll be better equipped to create secure code and system designs.

Wybrane bestsellery

O autorze książki

Mihir Shah a renowned cybersecurity expert, is celebrated for his innovative solutions and significant contributions. As an invited Industry mentor at Stanford University, he imparts knowledge on Web Exploitation, Kubernetes Exploitation, Cryptography, and Cloud Security. He usually speaks at international security conferences, sharing his research with the wider security community. He is also a fellow member of the BCS and other engineering societies, fostering a community of knowledge sharing and being a sought-after mentor and advisor for budding entrepreneurs in the security space. His research articles and projects in the security space, have received wide acclaim and are used by multiple organizations for security training and learning.

Packt Publishing - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
116,10 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint
Zabrania się wykorzystania treści strony do celów eksploracji tekstu i danych (TDM), w tym eksploracji w celu szkolenia technologii AI i innych systemów uczenia maszynowego. It is forbidden to use the content of the site for text and data mining (TDM), including mining for training AI technologies and other machine learning systems.