0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Practical Cloud Native Security with Falco - Risk and Threat Detection for Containers, Kubernetes, and Cloud (Paperback): Loris... Practical Cloud Native Security with Falco - Risk and Threat Detection for Containers, Kubernetes, and Cloud (Paperback)
Loris Degioanni, Leonardo Grasso
R1,093 Discovery Miles 10 930 Ships in 12 - 17 working days

As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution. In the meantime, security threats are growing more sophisticated and widespread every day. Protecting your applications from these threats requires the ability to defend them at runtime, when they're most vulnerable to attacks. This practical guide introduces you to Falco, the open source standard for continuous risk and threat detection across Kubernetes, containers, and the cloud. Falco creator Loris Degioanni and core maintainer Leonardo Grasso bring you up to speed on cloud native threat detection basics and show you how to get Falco up and running. You'll then dive into advanced topics such as deploying Falco in production and writing your own security rules. You'll learn how to: Leverage runtime security in cloud native environments Detect configuration changes and unexpected behavior in the cloud Protect containers, Kubernetes, and cloud applications using Falco Run, deploy, and customize Falco using advanced concepts Deploy, configure, and maintain Falco in a production environment Improve your organization's ability to pass compliance audits Implement threat detection for containers, Kubernetes, and cloud apps

Learn Kubernetes Security - Securely orchestrate, scale, and manage your microservices in Kubernetes deployments (Paperback):... Learn Kubernetes Security - Securely orchestrate, scale, and manage your microservices in Kubernetes deployments (Paperback)
Kaizhe Huang, Pranjal Jumde; Foreword by Loris Degioanni
R1,059 Discovery Miles 10 590 Ships in 10 - 15 working days

Secure your container environment against cyberattacks and deliver robust deployments with this practical guide Key Features Explore a variety of Kubernetes components that help you to prevent cyberattacks Perform effective resource management and monitoring with Prometheus and built-in Kubernetes tools Learn techniques to prevent attackers from compromising applications and accessing resources for crypto-coin mining Book DescriptionKubernetes is an open source orchestration platform for managing containerized applications. Despite widespread adoption of the technology, DevOps engineers might be unaware of the pitfalls of containerized environments. With this comprehensive book, you'll learn how to use the different security integrations available on the Kubernetes platform to safeguard your deployments in a variety of scenarios. Learn Kubernetes Security starts by taking you through the Kubernetes architecture and the networking model. You'll then learn about the Kubernetes threat model and get to grips with securing clusters. Throughout the book, you'll cover various security aspects such as authentication, authorization, image scanning, and resource monitoring. As you advance, you'll learn about securing cluster components (the kube-apiserver, CoreDNS, and kubelet) and pods (hardening image, security context, and PodSecurityPolicy). With the help of hands-on examples, you'll also learn how to use open source tools such as Anchore, Prometheus, OPA, and Falco to protect your deployments. By the end of this Kubernetes book, you'll have gained a solid understanding of container security and be able to protect your clusters from cyberattacks and mitigate cybersecurity threats. What you will learn Understand the basics of Kubernetes architecture and networking Gain insights into different security integrations provided by the Kubernetes platform Delve into Kubernetes' threat modeling and security domains Explore different security configurations from a variety of practical examples Get to grips with using and deploying open source tools to protect your deployments Discover techniques to mitigate or prevent known Kubernetes hacks Who this book is forThis book is for security consultants, cloud administrators, system administrators, and DevOps engineers interested in securing their container deployments. If you're looking to secure your Kubernetes clusters and cloud-based deployments, you'll find this book useful. A basic understanding of cloud computing and containerization is necessary to make the most of this book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Anamino Beef Protein (250g)
R289 R189 Discovery Miles 1 890
Celebrating Our Differences: Embracing…
Nkateko Emily Mabasa Paperback R165 R132 Discovery Miles 1 320
Tommee Tippee Sports Bottle 300ml - Free…
R95 Discovery Miles 950
Bunty 380GSM Golf Towel (30x50cm)(3…
R500 R255 Discovery Miles 2 550
Conwood Juliet Vanity Case (Black)
R606 Discovery Miles 6 060
JCB Chelsea Steel Toe Safety Boot (Tan…
R1,519 Discovery Miles 15 190
Ambivalent - Photography And Visibility…
Patricia Hayes, Gary Minkley Paperback R420 R355 Discovery Miles 3 550
Fine Living Meta Office Chair (Black)
R599 R549 Discovery Miles 5 490
Violet Bent Backwards Over The Grass…
Lana Del Rey CD R457 Discovery Miles 4 570

 

Partners