Infrastructure & Ops Superstream Series: Building Security Into Your Development Lifecycle
Sponsored by Aqua and Palo Alto Networks Security can't be added in at the end. We need to build it into everything we do ("pull left"). So how can developers get involved in building safer, more secure software? And what new skills do you need to learn to do so? About the Infrastruct...
Saved in:
Main Authors: | , , , , , , , |
---|---|
Corporate Author: | |
Format: | Electronic Video |
Language: | English |
Published: |
[Erscheinungsort nicht ermittelbar]
O'Reilly Media, Inc.
2021
|
Edition: | 1st edition. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/0636920625377/?ar |
Summary: | Sponsored by Aqua and Palo Alto Networks Security can't be added in at the end. We need to build it into everything we do ("pull left"). So how can developers get involved in building safer, more secure software? And what new skills do you need to learn to do so? About the Infrastructure & Ops Superstream Series: This five-part series of half-day online events details what you need to know to effectively manage existing legacy systems while migrating to modern, scalable, cost-effective infrastructures--with no interruption to your business. Each event day covers some of the most challenging and promising topics facing those working in infrastructure and operations today: continuous integration and delivery, cloud delivery, Kubernetes, microservices, and security. What you'll learn and how you can apply it Discover which tools work best for responding to threats Understand how to develop a cybersecurity strategy Learn how to recover from an attack on Kubernetes This recording of a live event is for you because ... You need to protect your systems from attacks by ransomware and emerging threats. You want to better understand the emerging threats landscape and what you can do to minimize and respond to attacks. You work with distributed systems and want to learn how to secure containers and Kubernetes. Recommended follow-up: Read " Security, Permissions, and Privacy " (chapter 9 in Learning Serverless) Read Kubernetes Security and Observability (early release book) Read Hacking Kubernetes (early release book) Read " Security and Backups " (chapter 11 in Cloud Native DevOps with Kubernetes) Read Building Microservices, second edition (book) Read Learning DevSecOps (early release book) Take Kubernetes Fundamentals in 3 Weeks (live online training course with Jon Johnson) |
Item Description: | Online resource; Title from title screen (viewed September 29, 2021) |
Physical Description: | 1 Online-Ressource (1 video file, aSeitenSeitenroximately 3 hr., 12 min.) |
Staff View
MARC
LEADER | 00000cgm a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-06852045X | ||
003 | DE-627-1 | ||
005 | 20240228121450.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 211006s2021 xx ||| |o o ||eng c | ||
035 | |a (DE-627-1)06852045X | ||
035 | |a (DE-599)KEP06852045X | ||
035 | |a (ORHE)0636920625377 | ||
035 | |a (DE-627-1)06852045X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Newman, Sam |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Infrastructure & Ops Superstream Series |b Building Security Into Your Development Lifecycle |c Newman, Sam |
250 | |a 1st edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b O'Reilly Media, Inc. |c 2021 | |
300 | |a 1 Online-Ressource (1 video file, aSeitenSeitenroximately 3 hr., 12 min.) | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; Title from title screen (viewed September 29, 2021) | ||
520 | |a Sponsored by Aqua and Palo Alto Networks Security can't be added in at the end. We need to build it into everything we do ("pull left"). So how can developers get involved in building safer, more secure software? And what new skills do you need to learn to do so? About the Infrastructure & Ops Superstream Series: This five-part series of half-day online events details what you need to know to effectively manage existing legacy systems while migrating to modern, scalable, cost-effective infrastructures--with no interruption to your business. Each event day covers some of the most challenging and promising topics facing those working in infrastructure and operations today: continuous integration and delivery, cloud delivery, Kubernetes, microservices, and security. What you'll learn and how you can apply it Discover which tools work best for responding to threats Understand how to develop a cybersecurity strategy Learn how to recover from an attack on Kubernetes This recording of a live event is for you because ... You need to protect your systems from attacks by ransomware and emerging threats. You want to better understand the emerging threats landscape and what you can do to minimize and respond to attacks. You work with distributed systems and want to learn how to secure containers and Kubernetes. Recommended follow-up: Read " Security, Permissions, and Privacy " (chapter 9 in Learning Serverless) Read Kubernetes Security and Observability (early release book) Read Hacking Kubernetes (early release book) Read " Security and Backups " (chapter 11 in Cloud Native DevOps with Kubernetes) Read Building Microservices, second edition (book) Read Learning DevSecOps (early release book) Take Kubernetes Fundamentals in 3 Weeks (live online training course with Jon Johnson) | ||
650 | 0 | |a Streaming video | |
650 | 0 | |a Internet videos | |
650 | 4 | |a Vidéo en continu | |
650 | 4 | |a Vidéos sur Internet | |
650 | 4 | |a streaming video | |
650 | 4 | |a Electronic videos | |
700 | 1 | |a McCune, Rory |e VerfasserIn |4 aut | |
700 | 1 | |a Smith, Taylor |e VerfasserIn |4 aut | |
700 | 1 | |a Look, Ping |e VerfasserIn |4 aut | |
700 | 1 | |a Cochran, Chris |e VerfasserIn |4 aut | |
700 | 1 | |a Ṭal, Liran |e VerfasserIn |4 aut | |
700 | 1 | |a Salazar, Jed |e VerfasserIn |4 aut | |
700 | 1 | |a Ivánkó, Natália |e VerfasserIn |4 aut | |
710 | 2 | |a Safari, an O'Reilly Media Company. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0636920625377/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-06852045X |
---|---|
_version_ | 1829007850823745536 |
adam_text | |
any_adam_object | |
author | Newman, Sam McCune, Rory Smith, Taylor Look, Ping Cochran, Chris Ṭal, Liran Salazar, Jed Ivánkó, Natália |
author_corporate | Safari, an O'Reilly Media Company |
author_corporate_role | ctb |
author_facet | Newman, Sam McCune, Rory Smith, Taylor Look, Ping Cochran, Chris Ṭal, Liran Salazar, Jed Ivánkó, Natália Safari, an O'Reilly Media Company |
author_role | aut aut aut aut aut aut aut aut |
author_sort | Newman, Sam |
author_variant | s n sn r m rm t s ts p l pl c c cc l t lt j s js n i ni |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)06852045X (DE-599)KEP06852045X (ORHE)0636920625377 |
edition | 1st edition. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03630cgm a22005052c 4500</leader><controlfield tag="001">ZDB-30-ORH-06852045X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121450.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">211006s2021 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)06852045X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP06852045X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0636920625377</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)06852045X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Newman, Sam</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Infrastructure & Ops Superstream Series</subfield><subfield code="b">Building Security Into Your Development Lifecycle</subfield><subfield code="c">Newman, Sam</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">O'Reilly Media, Inc.</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file, aSeitenSeitenroximately 3 hr., 12 min.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; Title from title screen (viewed September 29, 2021)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Sponsored by Aqua and Palo Alto Networks Security can't be added in at the end. We need to build it into everything we do ("pull left"). So how can developers get involved in building safer, more secure software? And what new skills do you need to learn to do so? About the Infrastructure & Ops Superstream Series: This five-part series of half-day online events details what you need to know to effectively manage existing legacy systems while migrating to modern, scalable, cost-effective infrastructures--with no interruption to your business. Each event day covers some of the most challenging and promising topics facing those working in infrastructure and operations today: continuous integration and delivery, cloud delivery, Kubernetes, microservices, and security. What you'll learn and how you can apply it Discover which tools work best for responding to threats Understand how to develop a cybersecurity strategy Learn how to recover from an attack on Kubernetes This recording of a live event is for you because ... You need to protect your systems from attacks by ransomware and emerging threats. You want to better understand the emerging threats landscape and what you can do to minimize and respond to attacks. You work with distributed systems and want to learn how to secure containers and Kubernetes. Recommended follow-up: Read " Security, Permissions, and Privacy " (chapter 9 in Learning Serverless) Read Kubernetes Security and Observability (early release book) Read Hacking Kubernetes (early release book) Read " Security and Backups " (chapter 11 in Cloud Native DevOps with Kubernetes) Read Building Microservices, second edition (book) Read Learning DevSecOps (early release book) Take Kubernetes Fundamentals in 3 Weeks (live online training course with Jon Johnson)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Streaming video</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéo en continu</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">streaming video</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic videos</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McCune, Rory</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Taylor</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Look, Ping</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cochran, Chris</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ṭal, Liran</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Salazar, Jed</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ivánkó, Natália</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0636920625377/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-06852045X |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:36:51Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file, aSeitenSeitenroximately 3 hr., 12 min.) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | O'Reilly Media, Inc. |
record_format | marc |
spelling | Newman, Sam VerfasserIn aut Infrastructure & Ops Superstream Series Building Security Into Your Development Lifecycle Newman, Sam 1st edition. [Erscheinungsort nicht ermittelbar] O'Reilly Media, Inc. 2021 1 Online-Ressource (1 video file, aSeitenSeitenroximately 3 hr., 12 min.) zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; Title from title screen (viewed September 29, 2021) Sponsored by Aqua and Palo Alto Networks Security can't be added in at the end. We need to build it into everything we do ("pull left"). So how can developers get involved in building safer, more secure software? And what new skills do you need to learn to do so? About the Infrastructure & Ops Superstream Series: This five-part series of half-day online events details what you need to know to effectively manage existing legacy systems while migrating to modern, scalable, cost-effective infrastructures--with no interruption to your business. Each event day covers some of the most challenging and promising topics facing those working in infrastructure and operations today: continuous integration and delivery, cloud delivery, Kubernetes, microservices, and security. What you'll learn and how you can apply it Discover which tools work best for responding to threats Understand how to develop a cybersecurity strategy Learn how to recover from an attack on Kubernetes This recording of a live event is for you because ... You need to protect your systems from attacks by ransomware and emerging threats. You want to better understand the emerging threats landscape and what you can do to minimize and respond to attacks. You work with distributed systems and want to learn how to secure containers and Kubernetes. Recommended follow-up: Read " Security, Permissions, and Privacy " (chapter 9 in Learning Serverless) Read Kubernetes Security and Observability (early release book) Read Hacking Kubernetes (early release book) Read " Security and Backups " (chapter 11 in Cloud Native DevOps with Kubernetes) Read Building Microservices, second edition (book) Read Learning DevSecOps (early release book) Take Kubernetes Fundamentals in 3 Weeks (live online training course with Jon Johnson) Streaming video Internet videos Vidéo en continu Vidéos sur Internet streaming video Electronic videos McCune, Rory VerfasserIn aut Smith, Taylor VerfasserIn aut Look, Ping VerfasserIn aut Cochran, Chris VerfasserIn aut Ṭal, Liran VerfasserIn aut Salazar, Jed VerfasserIn aut Ivánkó, Natália VerfasserIn aut Safari, an O'Reilly Media Company. MitwirkendeR ctb |
spellingShingle | Newman, Sam McCune, Rory Smith, Taylor Look, Ping Cochran, Chris Ṭal, Liran Salazar, Jed Ivánkó, Natália Infrastructure & Ops Superstream Series Building Security Into Your Development Lifecycle Streaming video Internet videos Vidéo en continu Vidéos sur Internet streaming video Electronic videos |
title | Infrastructure & Ops Superstream Series Building Security Into Your Development Lifecycle |
title_auth | Infrastructure & Ops Superstream Series Building Security Into Your Development Lifecycle |
title_exact_search | Infrastructure & Ops Superstream Series Building Security Into Your Development Lifecycle |
title_full | Infrastructure & Ops Superstream Series Building Security Into Your Development Lifecycle Newman, Sam |
title_fullStr | Infrastructure & Ops Superstream Series Building Security Into Your Development Lifecycle Newman, Sam |
title_full_unstemmed | Infrastructure & Ops Superstream Series Building Security Into Your Development Lifecycle Newman, Sam |
title_short | Infrastructure & Ops Superstream Series |
title_sort | infrastructure ops superstream series building security into your development lifecycle |
title_sub | Building Security Into Your Development Lifecycle |
topic | Streaming video Internet videos Vidéo en continu Vidéos sur Internet streaming video Electronic videos |
topic_facet | Streaming video Internet videos Vidéo en continu Vidéos sur Internet streaming video Electronic videos |
work_keys_str_mv | AT newmansam infrastructureopssuperstreamseriesbuildingsecurityintoyourdevelopmentlifecycle AT mccunerory infrastructureopssuperstreamseriesbuildingsecurityintoyourdevelopmentlifecycle AT smithtaylor infrastructureopssuperstreamseriesbuildingsecurityintoyourdevelopmentlifecycle AT lookping infrastructureopssuperstreamseriesbuildingsecurityintoyourdevelopmentlifecycle AT cochranchris infrastructureopssuperstreamseriesbuildingsecurityintoyourdevelopmentlifecycle AT talliran infrastructureopssuperstreamseriesbuildingsecurityintoyourdevelopmentlifecycle AT salazarjed infrastructureopssuperstreamseriesbuildingsecurityintoyourdevelopmentlifecycle AT ivankonatalia infrastructureopssuperstreamseriesbuildingsecurityintoyourdevelopmentlifecycle AT safarianoreillymediacompany infrastructureopssuperstreamseriesbuildingsecurityintoyourdevelopmentlifecycle |