32,39 €
32,39 €
inkl. MwSt.
Sofort per Download lieferbar
payback
0 °P sammeln
32,39 €
32,39 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
Als Download kaufen
32,39 €
inkl. MwSt.
Sofort per Download lieferbar
payback
0 °P sammeln
Jetzt verschenken
32,39 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
  • Format: ePub

For cloud security engineers, it's crucial to look beyond the limited managed services provided by cloud vendors and make use of the wide array of cloud native tools available to developers and security professionals, which enable the implementation of security solutions at scale. This book covers technologies that secure infrastructure, containers, and runtime environments using vendor-agnostic cloud native tools under the Cloud Native Computing Foundation (CNCF).
The book begins with an introduction to the whats and whys of the cloud native environment, providing a primer on the
…mehr

  • Geräte: eReader
  • ohne Kopierschutz
  • eBook Hilfe
  • FamilySharing(5)
Produktbeschreibung
For cloud security engineers, it's crucial to look beyond the limited managed services provided by cloud vendors and make use of the wide array of cloud native tools available to developers and security professionals, which enable the implementation of security solutions at scale. This book covers technologies that secure infrastructure, containers, and runtime environments using vendor-agnostic cloud native tools under the Cloud Native Computing Foundation (CNCF).
The book begins with an introduction to the whats and whys of the cloud native environment, providing a primer on the platforms that you'll explore throughout. You'll then progress through the book, following the phases of application development. Starting with system design choices, security trade-offs, and secure application coding techniques that every developer should be mindful of, you'll delve into more advanced topics such as system security architecture and threat modelling practices. The book concludes by explaining the legal and regulatory frameworks governing security practices in the cloud native space and highlights real-world repercussions that companies have faced as a result of immature security practices.
By the end of this book, you'll be better equipped to create secure code and system designs.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Mihir Shah is a security expert and industry leader with extensive experience in cloud-native security. He has been invited as an Industry Mentor at Stanford University and has delivered talks on various security topics such as web exploitation, Kubernetes exploitation, cryptography, and cloud security. He is a frequent speaker and trainer at industry conferences such as OWASP, DefCon, Bsides Paris, GitHub Satellite, null Bangalore, and All Day DevOps. He has published several papers on security topics. He is an invited judge for the prestigious Stevie, Globee, and Codie awards for 2023 in New York. He also has studied Law under one of the most renounced professors at Harvard Law and upholds the regulations in his cybersecurity career.