You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if the deployment is secure? This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine appropriate solutions. Author Liz Rice, Chief Open Source Officer at Isovalent, looks at how the building blocks commonly used in container-based systems are constructed in Linux. You'll understand what's happening when you deploy containers and learn how to assess potential security risks that could affect your deployments. If you run container appli...
Secure your container environment against cyberattacks and deliver robust deployments with this practical guide Key FeaturesExplore a variety of Kubernetes components that help you to prevent cyberattacksPerform effective resource management and monitoring with Prometheus and built-in Kubernetes toolsLearn techniques to prevent attackers from compromising applications and accessing resources for crypto-coin miningBook Description Kubernetes is an open source orchestration platform for managing containerized applications. Despite widespread adoption of the technology, DevOps engineers might be unaware of the pitfalls of containerized environments. With this comprehensive book, you'll learn ho...
A love letter to Singaporean cooking and family traditions. Southeast Asian cuisine is a proud mix of migrants and influences from all across Asia, which fuses together to create something even greater than the original. In this beautiful new collection, rising star Elizabeth Haigh draws together recipes that have been handed down through many generations of her family, from Nonya to Nonya, creating a time-capsule of a cuisine. Growing up, it was through food that Elizabeth's mother demonstrated her affection, and the passion and love poured into each recipe is all collated here; a love letter to family cooking and traditions. Recipes include: Nonya-spiced braised duck stew pickled watermelon and radish salad beef rendang Singapore chilli crab fried tofu with spicy peanut sauce spicy noodle soup nasi goreng (spicy fried rice) Miso apple pie ... and many more! Adapting these traditional recipes to ensure ingredients are easily sourced in the West, Elizabeth Haigh brings a taste of Singapore to your own kitchen.
What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves. It's an extraordinary platform for building a whole new generation of security, observability, and networking tools. This practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works. Author Liz Rice, chief open source officer with cloud native networking and security specialists Isovalent, also provides a foundation for those who want to explore writing eBPF programs themselves. With this book, you will: Learn why eBPF has become so important in the past couple of years Write basic eBPF code, and manipulate eBPF programs and attach them to events Explore how eBPF components interact with Linux to dynamically change the operating system's behavior Learn how tools based on eBPF can instrument applications without changes to the apps or their configuration Discover how this technology enables new tools for observability, security, and networking
This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography. You’ll also learn: - Key concepts in cryptography, such as computational security, attacker models, and forward secrecy - The strengths and limitations of the TLS protocol behind HTTPS secure websites - Quantum computation and post-quantum cryptography - About various vulnerabilities by examining numerous code examples and use cases - How to choose the best algorithm or protocol and ask vendors the right questions Each chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. Whether you’re a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications.
When her American family returns to the U.S. after sixteen years in South Korea, Liz is a hidden immigrant. Her mixed-up cultural identity is veiled behind the face of the girl down the street. She's the granddaughter of upperclass Americans, but her homeland is a divided Asian peninsula of neon-lit cities, five-hundred-year-old palaces, and army dictators. Rice tells the story of her life in South Korea from ages nine months to sixteen, the influence of the tragedy and tension of the Korean peninsula, and the story of her parents, who walked arm-in-arm with social activists during South Korea's democratic revolution. Told with honesty and humor, Rituals of Separation captures the tension of living between identities, the deep longing for home, and the determination to find healing in the face of unrecoverable loss.
Today, software engineers need to know not only how to program effectively but also how to develop proper engineering practices to make their codebase sustainable and healthy. This book emphasizes this difference between programming and software engineering. How can software engineers manage a living codebase that evolves and responds to changing requirements and demands over the length of its life? Based on their experience at Google, software engineers Titus Winters and Hyrum Wright, along with technical writer Tom Manshreck, present a candid and insightful look at how some of the worldâ??s leading practitioners construct and maintain software. This book covers Googleâ??s unique engineer...
Kubernetes is the operating system of the cloud native world, providing a reliable and scalable platform for running containerized workloads. In this friendly, pragmatic book, cloud experts John Arundel and Justin Domingus show you what Kubernetes can do—and what you can do with it. You’ll learn all about the Kubernetes ecosystem, and use battle-tested solutions to everyday problems. You’ll build, step by step, an example cloud native application and its supporting infrastructure, along with a development environment and continuous deployment pipeline that you can use for your own applications. Understand containers and Kubernetes from first principles; no experience necessary Run your own clusters or choose a managed Kubernetes service from Amazon, Google, and others Use Kubernetes to manage resource usage and the container lifecycle Optimize clusters for cost, performance, resilience, capacity, and scalability Learn the best tools for developing, testing, and deploying your applications Apply the latest industry practices for security, observability, and monitoring Adopt DevOps principles to help make your development teams lean, fast, and effective
Big Brother gets up close and personal. Do you know about RFID (Radio Frquency IDentification)? Well, you should, because in just a few short years, this explosive new technology could tell marketers, criminals, and government snoops everything about you. Welcome to the world of spychips, where tiny computer chips smaller than a grain of sand will trace everyday objects?and even people?keeping tabs on everything you own and everywhere you go. In this startling, eye-opening book, you'll learn how powerful corporations are planning a future where: Strangers will be able to scan the contents of your purse or briefcase from across a room. Stores will change prices as you approach-squeezing extra...
This generously illustrated, fact-filled volume showcases more than 1,000 outstanding plants that run the gamut from childhood favorites and heirloom rediscoveries to the latest introductions and new cultivars. Plants are the backbone of a garden, and this book provides invaluable guidance in deciding what to grow next, from childhood favorites, rediscovered heirlooms, and curiosities to the latest introductions from hybridizers and plant hunters.The book is organized first by the groups in which plants are usually sold (annuals, bulbs, perennials, etc.), then by globally recognized botanical names, with common names where relevant. It includes plants useful for the smallest spaces, such as ...