Hacking Kubernetes: Threat-Driven Analysis and Defense (Third Early Release)

Автор: literator от 17-08-2021, 00:22, Коментариев: 0

Категория: КНИГИ » ПРОГРАММИРОВАНИЕ

Hacking Kubernetes: Threat-Driven Analysis and Defense (Third Early Release)Название: Hacking Kubernetes: Threat-Driven Analysis and Defense (Third Early Release)
Автор: Andrew Martin, Michael Hausenblas
Издательство: O’Reilly Media, Inc.
Год: 2021-08-16
Страниц: 132
Язык: английский
Формат: epub
Размер: 12.4 MB

Running cloud native workloads on Kubernetes can be challenging: keeping them secure is even more so. Kubernetes' complexity offers malicious in-house users and external attackers alike a large assortment of attack vectors. Hacking Kubernetes reviews defaults and threat models and shows how to protect against attacks.

Securing your workloads is both essential and urgent, so this invaluable hands-on guide is available to you in this early release edition before it's available to the general public.

It covers topics critical for cloud native security, detailing how to:

Run Kubernetes securely, on both a strategic and an operational level
Exploit Kubernetes default configurations and defend against these kinds of attacks
Review Kubernetes clusters for security weaknesses
Securely run arbitrary and untrusted code
Harden the Kubernetes setup to defend against any and all possible threats

To get most out of the book, we assume that you either have a devops role, are a Kubernetes platform person, a cloud native architect, a Site Reliability Engineer (SRE), or something related to Chief Information Security Officer (CISO). We further assume that you’re interested in hands-on, that is, while we discuss threats and defenses in principle, we try our best to demonstrate them at the same time and point you to tools that can help you.

At this point we also want to make sure you understand that the book you’re reading is targeting advanced topics. We assume that you’re already familiar with Kubernetes, and specifically Kubernetes security topics, at least on a surface level. In other words, we don’t go into much details about how things work but summarise or recap important concepts or mechanisms on a per-chapter basis.

Скачать Hacking Kubernetes: Threat-Driven Analysis and Defense (Third Early Release)




ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


Нашел ошибку? Есть жалоба? Жми!
Пожаловаться администрации
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.