Microservices Security in Action video edition:
A complete guide to the challenges and solutions in securing microservices architectures. Massimo Siani, FinDynamic Unlike traditional enterprise applications, Microservices applications are collections of independent components that function as a system. Securing the messages, queues, and API endpo...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Körperschaft: | |
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
Manning Publications
2020
|
Ausgabe: | 1st edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781617295959VE/?ar |
Zusammenfassung: | A complete guide to the challenges and solutions in securing microservices architectures. Massimo Siani, FinDynamic Unlike traditional enterprise applications, Microservices applications are collections of independent components that function as a system. Securing the messages, queues, and API endpoints requires new approaches to security both in the infrastructure and the code. Microservices Security in Action teaches you how to address microservices-specific security challenges throughout the system. This practical guide includes plentiful hands-on exercises using industry-leading open-source tools and examples using Java and Spring Boot. about the technology Integrating independent services into a single system presents special security challenges in a microservices deployment. With proper planning, however, you can build in security from the start. Learn to create secure services and protect application data throughout development and deployment. As microservices continue to change enterprise application systems, developers and architects must learn to integrate security into their design and implementation. Because microservices are created as a system of independent components, each a possible point of failure, they can multiply the security risk. With proper planning, design, and implementation, you can reap the benefits of microservices while keeping your application data--and your company's reputation--safe! about the book Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Detailed code samples, exercises, and real-world use cases help you put what you've learned into production. Along the way, authors and software security experts Prabath Siriwardena and Nuwan Dias shine a light on important concepts like throttling, analytics gathering, access control at the API gateway, and microservice-to-microservice communication. You'll also discover how to securely deploy microservices using state-of-the-art technologies including Kubernetes, Docker, and the Istio service mesh. Lots of hands-on exercises secure your learning as you go, and this straightforward guide wraps up with a security process review and best practices. When you're finished reading, you'll be planning, designing, and implementing microservices applications with the priceless confidence that comes with knowing they're secure! what's inside Mi ... |
Beschreibung: | Online resource; Title from title screen (viewed July 11, 2020) |
Umfang: | 1 Online-Ressource (1 video file, circa 21 hr., 8 min.) |
Internformat
MARC
LEADER | 00000cgm a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-06365895X | ||
003 | DE-627-1 | ||
005 | 20240228121348.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 210519s2020 xx ||| |o o ||eng c | ||
035 | |a (DE-627-1)06365895X | ||
035 | |a (DE-599)KEP06365895X | ||
035 | |a (ORHE)9781617295959VE | ||
035 | |a (DE-627-1)06365895X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Siriwardena, Prabath |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Microservices Security in Action video edition |c Siriwardena, Prabath |
250 | |a 1st edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b Manning Publications |c 2020 | |
300 | |a 1 Online-Ressource (1 video file, circa 21 hr., 8 min.) | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; Title from title screen (viewed July 11, 2020) | ||
520 | |a A complete guide to the challenges and solutions in securing microservices architectures. Massimo Siani, FinDynamic Unlike traditional enterprise applications, Microservices applications are collections of independent components that function as a system. Securing the messages, queues, and API endpoints requires new approaches to security both in the infrastructure and the code. Microservices Security in Action teaches you how to address microservices-specific security challenges throughout the system. This practical guide includes plentiful hands-on exercises using industry-leading open-source tools and examples using Java and Spring Boot. about the technology Integrating independent services into a single system presents special security challenges in a microservices deployment. With proper planning, however, you can build in security from the start. Learn to create secure services and protect application data throughout development and deployment. As microservices continue to change enterprise application systems, developers and architects must learn to integrate security into their design and implementation. Because microservices are created as a system of independent components, each a possible point of failure, they can multiply the security risk. With proper planning, design, and implementation, you can reap the benefits of microservices while keeping your application data--and your company's reputation--safe! about the book Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Detailed code samples, exercises, and real-world use cases help you put what you've learned into production. Along the way, authors and software security experts Prabath Siriwardena and Nuwan Dias shine a light on important concepts like throttling, analytics gathering, access control at the API gateway, and microservice-to-microservice communication. You'll also discover how to securely deploy microservices using state-of-the-art technologies including Kubernetes, Docker, and the Istio service mesh. Lots of hands-on exercises secure your learning as you go, and this straightforward guide wraps up with a security process review and best practices. When you're finished reading, you'll be planning, designing, and implementing microservices applications with the priceless confidence that comes with knowing they're secure! what's inside Mi ... | ||
650 | 4 | |a Electronic videos ; local | |
700 | 1 | |a Dias, Nuwan |e VerfasserIn |4 aut | |
710 | 2 | |a Safari, an O'Reilly Media Company., |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781617295959VE/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-06365895X |
---|---|
_version_ | 1831287159366090752 |
adam_text | |
any_adam_object | |
author | Siriwardena, Prabath Dias, Nuwan |
author_corporate | Safari, an O'Reilly Media Company |
author_corporate_role | ctb |
author_facet | Siriwardena, Prabath Dias, Nuwan Safari, an O'Reilly Media Company |
author_role | aut aut |
author_sort | Siriwardena, Prabath |
author_variant | p s ps n d nd |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)06365895X (DE-599)KEP06365895X (ORHE)9781617295959VE |
edition | 1st edition. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03822cgm a22003732c 4500</leader><controlfield tag="001">ZDB-30-ORH-06365895X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121348.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">210519s2020 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)06365895X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP06365895X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781617295959VE</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)06365895X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Siriwardena, Prabath</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Microservices Security in Action video edition</subfield><subfield code="c">Siriwardena, Prabath</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">Manning Publications</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file, circa 21 hr., 8 min.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; Title from title screen (viewed July 11, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A complete guide to the challenges and solutions in securing microservices architectures. Massimo Siani, FinDynamic Unlike traditional enterprise applications, Microservices applications are collections of independent components that function as a system. Securing the messages, queues, and API endpoints requires new approaches to security both in the infrastructure and the code. Microservices Security in Action teaches you how to address microservices-specific security challenges throughout the system. This practical guide includes plentiful hands-on exercises using industry-leading open-source tools and examples using Java and Spring Boot. about the technology Integrating independent services into a single system presents special security challenges in a microservices deployment. With proper planning, however, you can build in security from the start. Learn to create secure services and protect application data throughout development and deployment. As microservices continue to change enterprise application systems, developers and architects must learn to integrate security into their design and implementation. Because microservices are created as a system of independent components, each a possible point of failure, they can multiply the security risk. With proper planning, design, and implementation, you can reap the benefits of microservices while keeping your application data--and your company's reputation--safe! about the book Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Detailed code samples, exercises, and real-world use cases help you put what you've learned into production. Along the way, authors and software security experts Prabath Siriwardena and Nuwan Dias shine a light on important concepts like throttling, analytics gathering, access control at the API gateway, and microservice-to-microservice communication. You'll also discover how to securely deploy microservices using state-of-the-art technologies including Kubernetes, Docker, and the Istio service mesh. Lots of hands-on exercises secure your learning as you go, and this straightforward guide wraps up with a security process review and best practices. When you're finished reading, you'll be planning, designing, and implementing microservices applications with the priceless confidence that comes with knowing they're secure! what's inside Mi ...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic videos ; local</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dias, Nuwan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.,</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781617295959VE/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-06365895X |
illustrated | Not Illustrated |
indexdate | 2025-05-05T13:25:29Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file, circa 21 hr., 8 min.) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Manning Publications |
record_format | marc |
spelling | Siriwardena, Prabath VerfasserIn aut Microservices Security in Action video edition Siriwardena, Prabath 1st edition. [Erscheinungsort nicht ermittelbar] Manning Publications 2020 1 Online-Ressource (1 video file, circa 21 hr., 8 min.) zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; Title from title screen (viewed July 11, 2020) A complete guide to the challenges and solutions in securing microservices architectures. Massimo Siani, FinDynamic Unlike traditional enterprise applications, Microservices applications are collections of independent components that function as a system. Securing the messages, queues, and API endpoints requires new approaches to security both in the infrastructure and the code. Microservices Security in Action teaches you how to address microservices-specific security challenges throughout the system. This practical guide includes plentiful hands-on exercises using industry-leading open-source tools and examples using Java and Spring Boot. about the technology Integrating independent services into a single system presents special security challenges in a microservices deployment. With proper planning, however, you can build in security from the start. Learn to create secure services and protect application data throughout development and deployment. As microservices continue to change enterprise application systems, developers and architects must learn to integrate security into their design and implementation. Because microservices are created as a system of independent components, each a possible point of failure, they can multiply the security risk. With proper planning, design, and implementation, you can reap the benefits of microservices while keeping your application data--and your company's reputation--safe! about the book Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Detailed code samples, exercises, and real-world use cases help you put what you've learned into production. Along the way, authors and software security experts Prabath Siriwardena and Nuwan Dias shine a light on important concepts like throttling, analytics gathering, access control at the API gateway, and microservice-to-microservice communication. You'll also discover how to securely deploy microservices using state-of-the-art technologies including Kubernetes, Docker, and the Istio service mesh. Lots of hands-on exercises secure your learning as you go, and this straightforward guide wraps up with a security process review and best practices. When you're finished reading, you'll be planning, designing, and implementing microservices applications with the priceless confidence that comes with knowing they're secure! what's inside Mi ... Electronic videos ; local Dias, Nuwan VerfasserIn aut Safari, an O'Reilly Media Company., MitwirkendeR ctb |
spellingShingle | Siriwardena, Prabath Dias, Nuwan Microservices Security in Action video edition Electronic videos ; local |
title | Microservices Security in Action video edition |
title_auth | Microservices Security in Action video edition |
title_exact_search | Microservices Security in Action video edition |
title_full | Microservices Security in Action video edition Siriwardena, Prabath |
title_fullStr | Microservices Security in Action video edition Siriwardena, Prabath |
title_full_unstemmed | Microservices Security in Action video edition Siriwardena, Prabath |
title_short | Microservices Security in Action video edition |
title_sort | microservices security in action video edition |
topic | Electronic videos ; local |
topic_facet | Electronic videos ; local |
work_keys_str_mv | AT siriwardenaprabath microservicessecurityinactionvideoedition AT diasnuwan microservicessecurityinactionvideoedition AT safarianoreillymediacompany microservicessecurityinactionvideoedition |