Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Designing and Developing Secure Azure Solutions
  • Language: en
  • Pages: 1057

Designing and Developing Secure Azure Solutions

Plan, build, and maintain highly secure Azure applications and workloads As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the ...

Kubernetes and Cloud Native Associate (KCNA) Study Guide
  • Language: en
  • Pages: 266

Kubernetes and Cloud Native Associate (KCNA) Study Guide

Learn how to prepare for--and pass--the KCNA (Kubernetes and Cloud Native Associate) certification exam. This practical guide serves as both a study guide and point of entry for practitioners looking to explore and adopt cloud native technologies. Adrian Gonzalez Sanchez teaches you not only the core technology fundamentals, but also the community and industry that KCNA serves. With the meteoric rise in cloud adoption, cloud native technologies such as Kubernetes have become the de facto industry standard. Other Kubernetes certifications--CKAD, CKA, and CKS--are all geared towards higher level technical proficiency. The KCNA certification exam covers the cloud native environment generally as well as the fundamental Kubernetes skills and knowledge.

Kubernetes and Docker - An Enterprise Guide
  • Language: en
  • Pages: 526

Kubernetes and Docker - An Enterprise Guide

Apply Kubernetes beyond the basics of Kubernetes clusters by implementing IAM using OIDC and Active Directory, Layer 4 load balancing using MetalLB, advanced service integration, security, auditing, and CI/CD Key Features Find out how to add enterprise features to a Kubernetes cluster with theory and exercises to guide you Understand advanced topics including load balancing, externalDNS, IDP integration, security, auditing, backup, and CI/CD Create development clusters for unique testing requirements, including running multiple clusters on a single server to simulate an enterprise environment Book DescriptionContainerization has changed the DevOps game completely, with Docker and Kubernetes ...

Bootstrapping Service Mesh Implementations with Istio
  • Language: en
  • Pages: 418

Bootstrapping Service Mesh Implementations with Istio

A step-by-step guide to Istio Service Mesh implementation, with examples of complex and distributed workloads built using microservices architecture and deployed in Kubernetes Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn the design, implementation, and troubleshooting of Istio in a clear and concise format Grasp concepts, ideas, and solutions that can be readily applied in real work environments See Istio in action through examples that cover Terraform, GitOps, AWS, Kubernetes, and Go Book Description Istio is a game-changer in managing connectivity and operational efficiency of microservices, but implementing and using it in applications can be challengi...

Java Coding Guidelines
  • Language: en
  • Pages: 304

Java Coding Guidelines

“A must-read for all Java developers. . . . Every developer has a responsibility to author code that is free of significant security vulnerabilities. This book provides realistic guidance to help Java developers implement desired functionality with security, reliability, and maintainability goals in mind.” –Mary Ann Davidson, Chief Security Officer, Oracle Corporation Organizations worldwide rely on Java code to perform mission-critical tasks, and therefore that code must be reliable, robust, fast, maintainable, and secure. JavaTM Coding Guidelines brings together expert guidelines, recommendations, and code examples to help you meet these demands. Written by the same team that brought...

Learn Kubernetes Security
  • Language: en
  • Pages: 330

Learn Kubernetes Security

Secure your container environment against cyberattacks and deliver robust deployments with this practical guide Key FeaturesExplore a variety of Kubernetes components that help you to prevent cyberattacksPerform effective resource management and monitoring with Prometheus and built-in Kubernetes toolsLearn techniques to prevent attackers from compromising applications and accessing resources for crypto-coin miningBook Description Kubernetes is an open source orchestration platform for managing containerized applications. Despite widespread adoption of the technology, DevOps engineers might be unaware of the pitfalls of containerized environments. With this comprehensive book, you'll learn ho...

kubectl: Command-Line Kubernetes in a Nutshell
  • Language: en
  • Pages: 137

kubectl: Command-Line Kubernetes in a Nutshell

Manage Kubernetes applications using kubectl and discover the different Kubernetes clusters Key FeaturesExplore the Kubernetes command line for deploying applications, inspecting clusters, and viewing logsLeverage kubectl for Kubernetes application management and container debuggingApply your knowledge of Docker to learn kubectl equivalent commands for Docker subcommandsBook Description The kubectl command line tool lets you control Kubernetes clusters to manage nodes in the cluster and perform all types of Kubernetes operations. This introductory guide will get you up to speed with kubectl in no time. The book is divided into four parts, touching base on the installation and providing a gen...

Microsoft Azure Security
  • Language: de
  • Pages: 570

Microsoft Azure Security

Sichere Anwendungen und Workloads in der Cloud praktisches Tutorial und hilfreiches Referenzwerk in einem behandelt die Azure-Sicherheitsdienste sowohl auf Anwendungs- als auch auf Netzwerkebene sowie deren Zusammenarbeit inkl. kostenloser Code-Beispiele zum Download Wenn wichtige Anwendungen und Workloads eines Unternehmens in die Microsoft Azure-Cloud verlagert werden, müssen sie gegen eine Vielzahl von ebenso unterschiedlichen wie gefährlichen Bedrohungen gewappnet werden. Um ihre Sicherheit zu optimieren, ist es erforderlich, dass Sie diese bereits zuverlässig in Ihre Entwürfe einbauen, bewährte Best Practices über die gesamte Entwicklung hinweg anwenden und verschiedene Azure-Dien...

JavaScript Security
  • Language: de
  • Pages: 57

JavaScript Security

Prinzipiell kann jedes Computerprogramm Schwachstellen enthalten. Auch JavaScript- und HTML5-Code stellen hier keine Ausnahme dar. Im ersten Kapitel dieses shortcuts werden XSS und browserbasierte Botnets genauer betrachtet. Kapitel 2 geht auf die Sicherheitssituation von HTML5 ein. Dabei beleuchtet der Autor die Gefahrenpotenziale der neuen Grafikfunktionen der Auszeichnungssprache. Kapitel 3 beschäftigt sich mit neuen und verbesserten Angriffen, die auf Sicherheitskonferenzen vorgestellt wurden. Der Autor beschreibt, wie JavaScript-basierte Schadsoftware in den Browser gelangen kann und geht auf den Umgang mit den Sicherheitsangriffen ein. Hierzu werden das OWASP Enterprise Security API sowie die Content Service Policy zur Abwehr von XSS erläutert.

The CERT® C Coding Standard, Second Edition
  • Language: en
  • Pages: 568

The CERT® C Coding Standard, Second Edition

“At Cisco, we have adopted the CERT C Coding Standard as the internal secure coding standard for all C developers. It is a core component of our secure development lifecycle. The coding standard described in this book breaks down complex software security topics into easy-to-follow rules with excellent real-world examples. It is an essential reference for any developer who wishes to write secure and resilient software in C and C++.” —Edward D. Paradise, vice president, engineering, threat response, intelligence, and development, Cisco Systems Secure programming in C can be more difficult than even many experienced programmers realize. To help programmers write more secure code, The CER...