You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Secure your container environment against cyberattacks and deliver robust deployments with this practical guide Key FeaturesExplore a variety of Kubernetes components that help you to prevent cyberattacksPerform effective resource management and monitoring with Prometheus and built-in Kubernetes toolsLearn techniques to prevent attackers from compromising applications and accessing resources for crypto-coin miningBook Description Kubernetes is an open source orchestration platform for managing containerized applications. Despite widespread adoption of the technology, DevOps engineers might be unaware of the pitfalls of containerized environments. With this comprehensive book, you'll learn ho...
Learn how to prepare for—and pass—the Kubernetes and Cloud Native Associate (KCNA) certification exam. This practical guide serves as both a study guide and point of entry for practitioners looking to explore and adopt cloud native technologies. Adrián González Sánchez and Jorge Valenzuela Jiménez teach you not only the core technology fundamentals, but also the community and industry that KCNA serves. With the meteoric rise in cloud adoption, cloud native technologies such as Kubernetes have become the de facto industry standard. Other Kubernetes certifications—including KCSA, CKAD, CKA, and CKS—are all geared toward higher-level technical proficiency. The KCNA is the entry door...
Plan, build, and maintain highly secure Azure applications and workloads As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the ...
Manage Kubernetes applications using kubectl and discover the different Kubernetes clusters Key FeaturesExplore the Kubernetes command line for deploying applications, inspecting clusters, and viewing logsLeverage kubectl for Kubernetes application management and container debuggingApply your knowledge of Docker to learn kubectl equivalent commands for Docker subcommandsBook Description The kubectl command line tool lets you control Kubernetes clusters to manage nodes in the cluster and perform all types of Kubernetes operations. This introductory guide will get you up to speed with kubectl in no time. The book is divided into four parts, touching base on the installation and providing a gen...
A step-by-step guide to Istio Service Mesh implementation, with examples of complex and distributed workloads built using microservices architecture and deployed in Kubernetes Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn the design, implementation, and troubleshooting of Istio in a clear and concise format Grasp concepts, ideas, and solutions that can be readily applied in real work environments See Istio in action through examples that cover Terraform, GitOps, AWS, Kubernetes, and Go Book Description Istio is a game-changer in managing connectivity and operational efficiency of microservices, but implementing and using it in applications can be challengi...
Apply Kubernetes beyond the basics of Kubernetes clusters by implementing IAM using OIDC and Active Directory, Layer 4 load balancing using MetalLB, advanced service integration, security, auditing, and CI/CD Key Features Find out how to add enterprise features to a Kubernetes cluster with theory and exercises to guide you Understand advanced topics including load balancing, externalDNS, IDP integration, security, auditing, backup, and CI/CD Create development clusters for unique testing requirements, including running multiple clusters on a single server to simulate an enterprise environment Book DescriptionContainerization has changed the DevOps game completely, with Docker and Kubernetes ...
Harness the full power of Angular 17 with up-to-date tools and enterprise-level best practices Purchase of the print or Kindle book includes a free PDF eBook Key Features Dive straight into the most relevant topics that will help you build large, complex, and high-performance web applications Find updated examples, projects, and an overview of the latest tools and updates – including Jest, Cypress, NgRx workspace, Apollo GraphQL, and Angular Dev Tools Get to grips with reactive code and learn how to resolve potential issues before they crop up Book DescriptionIf you’re looking to upskill and build sophisticated, minimalist web applications suited for enterprise use, Angular for Enterpris...
It is our great pleasure to have you at the 2022 4th International Conference on Economic Management and Model Engineering (ICEMME 2022), which was held in Nanjing, China from November 18th to 20th (virtual event). It is an international forum for academic communications between experts and scholars in the fields of economic management and model engineering. The main objective of ICEMME 2022 is to provide a platform to deliberate latest developments and future directions in the fields of economic management and model engineering. The conference provided opportunities for the delegates to exchange research ideas and scientific information, and established business or research relations for all participants to find global partners for future collaboration.
Sichere Anwendungen und Workloads in der Cloud praktisches Tutorial und hilfreiches Referenzwerk in einem behandelt die Azure-Sicherheitsdienste sowohl auf Anwendungs- als auch auf Netzwerkebene sowie deren Zusammenarbeit inkl. kostenloser Code-Beispiele zum Download Wenn wichtige Anwendungen und Workloads eines Unternehmens in die Microsoft Azure-Cloud verlagert werden, müssen sie gegen eine Vielzahl von ebenso unterschiedlichen wie gefährlichen Bedrohungen gewappnet werden. Um ihre Sicherheit zu optimieren, ist es erforderlich, dass Sie diese bereits zuverlässig in Ihre Entwürfe einbauen, bewährte Best Practices über die gesamte Entwicklung hinweg anwenden und verschiedene Azure-Dien...
Learn how to build scalable cloud native applications with the new-generation Ballerina language using expert tips and best practices Key FeaturesWork with code samples based on the Ballerina Swan Lake Beta1 versionExplore the in-built networking protocol support in Ballerina to develop secure distributed appsBuild a Ballerina app with an automated CI/CD pipeline with observability to simplify maintenance and deploymentBook Description The Ballerina programming language was created by WSO2 for the modern needs of developers where cloud native development techniques have become ubiquitous. Ballerina simplifies how programmers develop and deploy cloud native distributed apps and microservices....