Hacking Kubernetes: Threat-Driven Analysis and Defense. 1st Ed. 244753

Паперова книга
244753
Hacking Kubernetes: Threat-Driven Analysis and Defense. 1st Ed. - фото 1
2'100
2 людини
Купити

Все про “Hacking Kubernetes: Threat-Driven Analysis and Defense. 1st Ed.”

Від видавця

Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Martin and Michael Hausenblas share best-practice configuration to help you harden clusters from possible angles of attack.
This book begins with a vanilla Kubernetes installation with built-in defaults. You'll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system.
  • Understand where your Kubernetes system is vulnerable with threat modelling techniques
  • Focus on pods, from configurations to attacks and defenses
  • Secure your cluster and workload traffic
  • Define and enforce policy with RBAC, OPA, and Kyverno
  • Dive deep into sandboxing and isolation techniques
  • Learn how to detect and mitigate supply chain attacks
  • Explore filesystems, volumes, and sensitive information at rest
  • Discover what can go wrong when running multitenant workloads in a cluster
  • Learn what you can do if someone breaks in despite you having controls in place

Рецензії

0

Всі характеристики

Товар входить до категорії

  • Самовивіз з відділень поштових операторів від 45 ₴ - 80 ₴
  • Безкоштовна доставка від 3000 грн
Схожі товари
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
267934
Stephanie DomasChristopher Domas
1'700 ₴
Security Chaos Engineering: Sustaining Resilience in Software and Systems 1st Edition
274007
Kelly ShortridgeAaron Rinehart
1'700 ₴
Zero Trust Networks: Building Secure Systems in Untrusted Network 2nd Edition
275838
Razi RaisChristina MorilloDoug BarthEvan Gilman
1'700 ₴
The Definitive Guide to Security in Jakarta EE. Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More. 1st Ed.
244733
Arjan Tijms, Teo Bais, Werner Keil
1'800 ₴
The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet (Tech Today) 1st Edition
280687
David Senecal
1'800 ₴
PowerShell Automation and Scripting for Cybersecurity: Hacking and defense for red and blue teamers
281518
Miriam C Wiesner
1'800 ₴
Cryptography and Cryptanalysis in MATLAB. 1st Ed.
244674
Marius Iulian Mihailescu, Stefania Loredana Nita
1'900 ₴
Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing
280690
James Forshaw
1'900 ₴
Kubernetes Security and Observability. A Holistic Approach to Securing Containers and Cloud Native Applications. 1st Ed.
244761
Brendan Creane, Amit Gupta
2'000 ₴
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity
261468
Michael KoflerKlaus GebeshuberPeter KloepFrank NeugebauerAndre ZingsheimThomas HacknerMarkus WidlRoland AignerStefan KaniaTobias ScheibleMatthias Wubbeling
2'700 ₴