Kubernetes security and observability: a holistic approach to securing containers and cloud native applications
Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of considerations, from infrastructure choices and cluster configuration to deployment controls and runtime and network security. With this practical book, you'll learn how to ado...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Sebastopol, CA
O'Reilly Media, Inc.
2021
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781098107093/?ar |
Zusammenfassung: | Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of considerations, from infrastructure choices and cluster configuration to deployment controls and runtime and network security. With this practical book, you'll learn how to adopt a holistic security and observability strategy for building and securing cloud native applications running on Kubernetes. Whether you're already working on cloud native applications or are in the process of migrating to its architecture, this guide introduces key security and observability concepts and best practices to help you unleash the power of cloud native applications. Authors Brendan Creane and Amit Gupta from Tigera take you through the full breadth of new cloud native approaches for establishing security and observability for applications running on Kubernetes. Learn why you need a security and observability strategy for cloud native applications and determine your scope of coverage Understand key concepts behind the book's security and observability approach Explore the technology choices available to support this strategy Discover how to share security responsibilities across multiple teams or roles Learn how to architect Kubernetes security and observability for multicloud and hybrid environments. |
Beschreibung: | Includes index. - Online resource; title from digital title page (viewed on December 29, 2021) |
Umfang: | 1 Online-Ressource |
ISBN: | 9781098107055 1098107055 9781098107079 1098107071 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-063080508 | ||
003 | DE-627-1 | ||
005 | 20240228121450.0 | ||
007 | cr uuu---uuuuu | ||
008 | 210427s2021 xx |||||o 00| ||eng c | ||
020 | |a 9781098107055 |c electronic book |9 978-1-0981-0705-5 | ||
020 | |a 1098107055 |c electronic book |9 1-0981-0705-5 | ||
020 | |a 9781098107079 |c electronic book |9 978-1-0981-0707-9 | ||
020 | |a 1098107071 |c electronic book |9 1-0981-0707-1 | ||
035 | |a (DE-627-1)063080508 | ||
035 | |a (DE-599)KEP063080508 | ||
035 | |a (ORHE)9781098107093 | ||
035 | |a (DE-627-1)063080508 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.3 |2 23 | |
100 | 1 | |a Creane, Brendan |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Kubernetes security and observability |b a holistic approach to securing containers and cloud native applications |c Brendan Creane & Amit Gupta |
264 | 1 | |a Sebastopol, CA |b O'Reilly Media, Inc. |c 2021 | |
264 | 4 | |c ©2022 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Online resource; title from digital title page (viewed on December 29, 2021) | ||
520 | |a Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of considerations, from infrastructure choices and cluster configuration to deployment controls and runtime and network security. With this practical book, you'll learn how to adopt a holistic security and observability strategy for building and securing cloud native applications running on Kubernetes. Whether you're already working on cloud native applications or are in the process of migrating to its architecture, this guide introduces key security and observability concepts and best practices to help you unleash the power of cloud native applications. Authors Brendan Creane and Amit Gupta from Tigera take you through the full breadth of new cloud native approaches for establishing security and observability for applications running on Kubernetes. Learn why you need a security and observability strategy for cloud native applications and determine your scope of coverage Understand key concepts behind the book's security and observability approach Explore the technology choices available to support this strategy Discover how to share security responsibilities across multiple teams or roles Learn how to architect Kubernetes security and observability for multicloud and hybrid environments. | ||
650 | 0 | |a Application software |x Development |x Computer programs | |
650 | 0 | |a Application program interfaces (Computer software) | |
650 | 0 | |a Cloud computing | |
650 | 4 | |a Logiciels d'application ; Développement ; Logiciels | |
650 | 4 | |a Interfaces de programmation d'applications | |
650 | 4 | |a Infonuagique | |
650 | 4 | |a APIs (interfaces) | |
650 | 4 | |a Application program interfaces (Computer software) | |
650 | 4 | |a Application software ; Development ; Computer programs | |
650 | 4 | |a Cloud computing | |
700 | 1 | |a Gupta, Amit |e VerfasserIn |4 aut | |
776 | 1 | |z 1098107101 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1098107101 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781098107093/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-063080508 |
---|---|
_version_ | 1821494833904091136 |
adam_text | |
any_adam_object | |
author | Creane, Brendan Gupta, Amit |
author_facet | Creane, Brendan Gupta, Amit |
author_role | aut aut |
author_sort | Creane, Brendan |
author_variant | b c bc a g ag |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)063080508 (DE-599)KEP063080508 (ORHE)9781098107093 |
dewey-full | 005.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.3 |
dewey-search | 005.3 |
dewey-sort | 15.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03419cam a22005412 4500</leader><controlfield tag="001">ZDB-30-ORH-063080508</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121450.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">210427s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781098107055</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-0981-0705-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1098107055</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-0981-0705-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781098107079</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-0981-0707-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1098107071</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-0981-0707-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)063080508</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP063080508</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781098107093</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)063080508</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Creane, Brendan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kubernetes security and observability</subfield><subfield code="b">a holistic approach to securing containers and cloud native applications</subfield><subfield code="c">Brendan Creane & Amit Gupta</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media, Inc.</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Online resource; title from digital title page (viewed on December 29, 2021)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of considerations, from infrastructure choices and cluster configuration to deployment controls and runtime and network security. With this practical book, you'll learn how to adopt a holistic security and observability strategy for building and securing cloud native applications running on Kubernetes. Whether you're already working on cloud native applications or are in the process of migrating to its architecture, this guide introduces key security and observability concepts and best practices to help you unleash the power of cloud native applications. Authors Brendan Creane and Amit Gupta from Tigera take you through the full breadth of new cloud native approaches for establishing security and observability for applications running on Kubernetes. Learn why you need a security and observability strategy for cloud native applications and determine your scope of coverage Understand key concepts behind the book's security and observability approach Explore the technology choices available to support this strategy Discover how to share security responsibilities across multiple teams or roles Learn how to architect Kubernetes security and observability for multicloud and hybrid environments.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Development</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application program interfaces (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels d'application ; Développement ; Logiciels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Interfaces de programmation d'applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">APIs (interfaces)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application program interfaces (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software ; Development ; Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Amit</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1098107101</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1098107101</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781098107093/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-063080508 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:40Z |
institution | BVB |
isbn | 9781098107055 1098107055 9781098107079 1098107071 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | O'Reilly Media, Inc. |
record_format | marc |
spelling | Creane, Brendan VerfasserIn aut Kubernetes security and observability a holistic approach to securing containers and cloud native applications Brendan Creane & Amit Gupta Sebastopol, CA O'Reilly Media, Inc. 2021 ©2022 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Online resource; title from digital title page (viewed on December 29, 2021) Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of considerations, from infrastructure choices and cluster configuration to deployment controls and runtime and network security. With this practical book, you'll learn how to adopt a holistic security and observability strategy for building and securing cloud native applications running on Kubernetes. Whether you're already working on cloud native applications or are in the process of migrating to its architecture, this guide introduces key security and observability concepts and best practices to help you unleash the power of cloud native applications. Authors Brendan Creane and Amit Gupta from Tigera take you through the full breadth of new cloud native approaches for establishing security and observability for applications running on Kubernetes. Learn why you need a security and observability strategy for cloud native applications and determine your scope of coverage Understand key concepts behind the book's security and observability approach Explore the technology choices available to support this strategy Discover how to share security responsibilities across multiple teams or roles Learn how to architect Kubernetes security and observability for multicloud and hybrid environments. Application software Development Computer programs Application program interfaces (Computer software) Cloud computing Logiciels d'application ; Développement ; Logiciels Interfaces de programmation d'applications Infonuagique APIs (interfaces) Application software ; Development ; Computer programs Gupta, Amit VerfasserIn aut 1098107101 Erscheint auch als Druck-Ausgabe 1098107101 |
spellingShingle | Creane, Brendan Gupta, Amit Kubernetes security and observability a holistic approach to securing containers and cloud native applications Application software Development Computer programs Application program interfaces (Computer software) Cloud computing Logiciels d'application ; Développement ; Logiciels Interfaces de programmation d'applications Infonuagique APIs (interfaces) Application software ; Development ; Computer programs |
title | Kubernetes security and observability a holistic approach to securing containers and cloud native applications |
title_auth | Kubernetes security and observability a holistic approach to securing containers and cloud native applications |
title_exact_search | Kubernetes security and observability a holistic approach to securing containers and cloud native applications |
title_full | Kubernetes security and observability a holistic approach to securing containers and cloud native applications Brendan Creane & Amit Gupta |
title_fullStr | Kubernetes security and observability a holistic approach to securing containers and cloud native applications Brendan Creane & Amit Gupta |
title_full_unstemmed | Kubernetes security and observability a holistic approach to securing containers and cloud native applications Brendan Creane & Amit Gupta |
title_short | Kubernetes security and observability |
title_sort | kubernetes security and observability a holistic approach to securing containers and cloud native applications |
title_sub | a holistic approach to securing containers and cloud native applications |
topic | Application software Development Computer programs Application program interfaces (Computer software) Cloud computing Logiciels d'application ; Développement ; Logiciels Interfaces de programmation d'applications Infonuagique APIs (interfaces) Application software ; Development ; Computer programs |
topic_facet | Application software Development Computer programs Application program interfaces (Computer software) Cloud computing Logiciels d'application ; Développement ; Logiciels Interfaces de programmation d'applications Infonuagique APIs (interfaces) Application software ; Development ; Computer programs |
work_keys_str_mv | AT creanebrendan kubernetessecurityandobservabilityaholisticapproachtosecuringcontainersandcloudnativeapplications AT guptaamit kubernetessecurityandobservabilityaholisticapproachtosecuringcontainersandcloudnativeapplications |