ODBIERZ TWÓJ BONUS :: »

    Cloud Native Software Security Handbook. Unleash the power of cloud native tools for robust security in modern applications

    (ebook) (audiobook) (audiobook) Język publikacji: angielski
    Cloud Native Software Security Handbook. Unleash the power of cloud native tools for robust security in modern applications Mihir Shah - okładka ebooka

    Cloud Native Software Security Handbook. Unleash the power of cloud native tools for robust security in modern applications Mihir Shah - okładka ebooka

    Cloud Native Software Security Handbook. Unleash the power of cloud native tools for robust security in modern applications Mihir Shah - okładka audiobooka MP3

    Cloud Native Software Security Handbook. Unleash the power of cloud native tools for robust security in modern applications Mihir Shah - okładka audiobooks CD

    Ocena:
    Bądź pierwszym, który oceni tę książkę
    Stron:
    372
    Dostępne formaty:
    PDF
    ePub

    Ebook

    129,00 zł

    Dodaj do koszyka lub Kup na prezent
    Kup 1-kliknięciem

    Przenieś na półkę

    Do przechowalni

    For cloud security engineers, it’s crucial to look beyond the limited managed services provided by cloud vendors and make use of the wide array of cloud native tools available to developers and security professionals, which enable the implementation of security solutions at scale. This book covers technologies that secure infrastructure, containers, and runtime environments using vendor-agnostic cloud native tools under the Cloud Native Computing Foundation (CNCF).
    The book begins with an introduction to the whats and whys of the cloud native environment, providing a primer on the platforms that you’ll explore throughout. You’ll then progress through the book, following the phases of application development. Starting with system design choices, security trade-offs, and secure application coding techniques that every developer should be mindful of, you’ll delve into more advanced topics such as system security architecture and threat modelling practices. The book concludes by explaining the legal and regulatory frameworks governing security practices in the cloud native space and highlights real-world repercussions that companies have faced as a result of immature security practices.
    By the end of this book, you'll be better equipped to create secure code and system designs.

    Wybrane bestsellery

    O autorze ebooka

    Mihir Shah a renowned cybersecurity expert, is celebrated for his innovative solutions and significant contributions. As an invited Industry mentor at Stanford University, he imparts knowledge on Web Exploitation, Kubernetes Exploitation, Cryptography, and Cloud Security. He usually speaks at international security conferences, sharing his research with the wider security community. He is also a fellow member of the BCS and other engineering societies, fostering a community of knowledge sharing and being a sought-after mentor and advisor for budding entrepreneurs in the security space. His research articles and projects in the security space, have received wide acclaim and are used by multiple organizations for security training and learning.

    Zamknij

    Wybierz metodę płatności

    Zamknij Pobierz aplikację mobilną Ebookpoint