Junte-se a nós em uma viagem ao mundo dos livros!
Adicionar este livro à prateleira
Grey
Deixe um novo comentário Default profile 50px
Grey
Assine para ler o livro completo ou leia as primeiras páginas de graça!
All characters reduced
Learning Kubernetes Security - A practical guide for secure and scalable containerized environments - cover
LER

Learning Kubernetes Security - A practical guide for secure and scalable containerized environments

Raul Lapaz

Editora: Packt Publishing

  • 0
  • 0
  • 0

Sinopse

With readily available services, support, and tools, Kubernetes has become a foundation for digital transformation and cloud-native development, but it brings significant security challenges such as breaches and supply chain attacks.
This updated edition equips you with defense strategies to protect your applications and infrastructure while understanding the attacker mindset, including tactics like container escapes and exploiting vulnerabilities to compromise clusters. The author distills his 25+ years of experience to guide you through Kubernetes components, architecture, and networking, addressing authentication, authorization, image scanning, resource monitoring, and traffic sniffing. You’ll implement security controls using third-party plugins (krew) and tools like Falco, Tetragon, and Cilium. You’ll also secure core components, such as the kube-apiserver, CoreDNS, and kubelet, while hardening images, managing security contexts, and applying PodSecurityPolicy. Through practical examples, the book teaches advanced techniques like redirecting traffic from misconfigured clusters to rogue pods and enhances your support incident response with effective cluster monitoring and log analysis.
By the end of the book, you'll have a solid grasp of container security as well as the skills to defend your clusters against evolving threats.
Disponível desde: 30/06/2025.
Comprimento de impressão: 390 páginas.

Outros livros que poderiam interessá-lo

  • How to start a business with almost no Money - Bootstrap Blueprint - cover

    How to start a business with...

    Andrine Mendez

    • 0
    • 0
    • 0
    Ever dreamed of starting your own business but felt held back by a lack of money, connections, or experience? This audiobook is for you. 
    Narrated by me, Andrine Mendez, this is not your typical self-help or get-rich-quick guide. Work in Progress is a brutally honest, no-nonsense blueprint for building a business from scratch, even when the odds are stacked against you. I’ve been through it all—bootstrapping, failing, pivoting, scaling, and even exiting a startup—and in this audiobook, I share the real stories, raw lessons, and practical strategies that can help you take the first step toward entrepreneurship. 
    You’ll learn:How to validate your idea before spending time and money.Why storytelling is crucial in attracting customers, investors, and talent.How to deal with failure and turn it into an advantage.The power of iteration and pivoting—why your first idea won’t be your final one. 
    This audiobook is not about theories or fluff—it’s packed with real, actionable steps based on my journey from launching businesses with zero capital to raising funds and exiting a company. You’ll also get bonus chapters on finding grants, startup competitions, and even picking the right brand name. 
    Whether you’re an aspiring entrepreneur, a professional looking for a change, or someone who just needs that extra push to get started, this audiobook is designed to inspire, challenge, and guide you toward building something real. 
    And if you enjoy this, do me a favor—leave a review! Your feedback helps this book reach more people who need it. Now, let’s get started.
    Ver livro
  • Thor's Hammer - cover

    Thor's Hammer

    Brian Phillipson

    • 0
    • 0
    • 0
    When the British Government turn down a revolutionary weapons system in favour of the new Euro fighter they don't realise the wrath their decision will cause. The only radar system capable of detecting the new Thor's Hammer is the experimental Spyglass system being transported on a cruise liner commanded by ex-Navy Captain Eric Swanson. Martin Westfarland, designer of Thor's Hammer, decides to teach the British Government a lesson by sinking the liner and destroying Spyglass before passing Thor's Hammer onto the Iraqis who plan to use it to deliver a deadly bio-weapon to the west. Through a series of action-filled events, Swanson and Squadron Leader Gerry Denton are brought together to thwart the terrorist attack, while the SAS are assigned to locate and destroy the chemical lab in the Syrian Desert, which created the virus. Unfortunately the virus has already been loaded onto Thor's Hammer. Thus it falls to Denton to fly the Typhoon Euro fighter against the faster and stealthier Thor's Hammer before it can deliver its deadly payload.
    Ver livro
  • Quick Guide for Creating Selling and Buying Non-Fungible Tokens (NFTs) - cover

    Quick Guide for Creating Selling...

    Dr. Hidaia Mahmood Alassouli

    • 0
    • 0
    • 0
    An NFT (non-fungible "non-interchangeable") token) simply represents ownership of an asset. Before choosing an NFT marketplace, you'll first want to decide the kind of digital asset you're interested in buying, selling, or creating. Just about anything digital -- the written word, videos, video games, art, collectors' items, etc. -- can be tokenized on a blockchain. Another consideration is the type of tokens supported on a marketplace.
    NFT marketplaces are your path to start investing in digital assets, collectibles, and art, but there are lots of options out there. Be sure to choose one that suits your buying and storage needs based on the type of NFT you're after and the crypto you're interested in using for transactions.
    This is a new industry and is highly speculative. The value of digital art and collectibles works much the same as physical art and collectibles: Value is subjective and determined by factors such as uniqueness and the reputation of the artist who made it.
    I know what you're thinking, why would anyone pay hundreds of thousands of dollars for a photo or video when they can only upload it? But it's just like real art, the copy of the photo is not the original! NFT is different because you get ownership of that piece of art when you buy it, otherwise you might be violating some copyright laws.
    
    Opensea.io is the most common online marketplace for non-fungible tokens.
    The report includes the following parts:
    1.What is NFT??
    2. Can't just upload the digital assets instead of buying them on NFT???
    3. Some NFT marketplaces.
    4. Using Opensea.io to sell and buy NFT assets.
    5. Creating and minting NFT assets in OpenSea.io.
    6. How to create and sell NFT on Binance NFT Marketplace.
    7. How to create and sell NFT on Gate.io NFT Marketplace.
    8. How to create and sell NFT on FTX.US NFT Marketplace.
    9. Example on selling NFT assets on OpeanSea.io.
    10. References.
     
    Ver livro
  • Debunking 20 Bitcoin Myths: Unlocking America's Crypto Future - Shatter Illusions on Volatility Regulation and Power – Invest Smarter in the US Digital Gold Rush - cover

    Debunking 20 Bitcoin Myths:...

    Anônimo

    • 0
    • 0
    • 0
    This audiobook is narrated by an AI Voice.   
    Debunking 20 Bitcoin Myths: Unlocking America's Crypto Future cuts through bubble headlines and doomsday climate takes to ask what this code actually does for US money, power and policy. From "it's a Ponzi" and "has no real use" to "will be banned" and "kills the planet", Miguel Thornton tests each viral claim against SEC filings, Fed speeches, ETF flows, mining data and real world case studies of savers, migrants and miners. In twenty sharp, tightly sourced chapters he explains how Wall Street, regulators and media built comforting myths that protect the old system, and what the numbers really say about volatility, regulation, inequality and national security. If you want to argue or invest in Bitcoin with factsinstead of memes, start here.
    Ver livro
  • Secure Edge Computing for IoT - Master Security Protocols Device Management Data Encryption and Privacy Strategies to Innovate Solutions for Edge Computing in IoT - cover

    Secure Edge Computing for IoT -...

    Oluyemi Odeyinka

    • 0
    • 0
    • 0
    Securing the Future of IoT with Advanced Edge Computing Solutions
    Book Description
    Embark on a journey into the cutting-edge world of secure edge computing. In this meticulously crafted handbook, delve deep into the intricacies of this transformative technology that is reshaping the landscape of computing. 
    From its fundamental principles to advanced applications, this book leaves no stone unturned in demystifying the complexities of secure edge computing. Explore the architecture that underpins this paradigm shift, unraveling how it seamlessly integrates cloud resources with local devices to enhance efficiency and reliability. Dive into the nuances of security in edge computing, understanding the unique challenges posed by distributed networks and diverse endpoints. 
    Discover real-world case studies and best practices from industry experts, gaining invaluable insights into deploying and managing secure edge computing solutions across various domains. With clear explanations, practical examples, and actionable advice, Secure Edge Computing For IoT empowers you to harness the full potential of this transformative technology while fortifying your digital infrastructure against evolving security risks. Prepare to embark on a journey of innovation and resilience at the edge of tomorrow’s computing landscape. 
    
    Table of Contents
    
    1. Introduction to IoT and Edge Computing
    2. Edge Computing Fundamentals and Use Cases
    3. Edge Networking and Routing Protocols
    4. IoT and Edge Computing Security
    5. Data Analytics and Machine Learning at Edge
    6. Secure Edge Design and Development
    7. Secure Edge Penetration Testing and Incident Management
    8. Edge Computing Cybersecurity and Cryptography
    9. Cloud Computing in the Context of Edge Computing
    10. Secure Edge Development and Implementation   
    Index
    Ver livro
  • Ways of Attending - How our Divided Brain Constructs the World - cover

    Ways of Attending - How our...

    Iain McGilchrist

    • 0
    • 0
    • 0
    Attention is not just receptive, but actively creative of the world we inhabit. How we attend makes all the difference to the world we experience. And nowadays in the West we generally attend in a rather unusual way: governed by the narrowly focussed, target-driven left hemisphere of the brain.  
    Forget everything you thought you knew about the difference between the hemispheres, because it will be largely wrong. It is not what each hemisphere does – they are both involved in everything – but how it does it, that matters. And the prime difference between the brain hemispheres is the manner in which they attend. For reasons of survival we need one hemisphere (in humans and many animals, the left) to pay narrow attention to detail, to grab hold of things we need, while the other, the right, keeps an eye out for everything else. The result is that one hemisphere is good at utilising the world, the other better at understanding it.  
    Absent, present, detached, engaged, alienated, empathic, broad or narrow, sustained or piecemeal, attention has the power to alter whatever it meets. The play of attention can both create and destroy, but it never leaves its object unchanged. How you attend to something – or don’t attend to it – matters a very great deal. This book helps you to see what it is you may have been trained by our very unusual culture not to see.  
    Ways of Attending is expertly read by Mike Fraser. The cover design has been adapted from a Cajal original drawing, and used with permission of Legado Cajal (Madrid).  
    This audiobook was produced and published by Echo Point Books & Media, an independent bookseller in Brattleboro, Vermont. © 2018 Iain McGilchrist (P)
    Ver livro