Security for Cloud Native Applications Eyal Estrin
(ebook)
(audiobook)
(audiobook)
- Autor:
- Eyal Estrin
- Wydawnictwo:
- BPB Publications
- Ocena:
- Stron:
- 250
- Dostępne formaty:
-
ePubMobi
Czytaj fragment
Opis
książki
:
Security for Cloud Native Applications
Your practical handbook for securing cloud-native applications
Key Features
An overview of security in cloud-native applications, such as modern architectures, containers, CI/CD pipeline, and so on.
Using automation, such as infrastructure as code and policy as code, to achieve security at scale.
Implementing security, from encryption and secrets management to threat management. Description
Security for cloud-native applications is an overview of cloud-native applications characteristics from a security point of view, filled with best practices for securing services based on AWS, Azure, and GCP infrastructure.
This book is a practical guide for securing cloud-native applications throughout their lifecycle. It establishes foundational knowledge of cloud services and cloud-native characteristics. It focuses on securing design approaches like APIs, microservices, and event-driven architectures. Specific technologies like containers, Kubernetes, and serverless functions are covered with security best practices. The book emphasizes integrating security throughout development using CI/CD pipelines and IaC tools. It explores policy as code for enforcing security policies and immutable infrastructure for enhanced security posture. Key management and threat detection strategies are also covered. Finally, the book offers a practical example and resources for further learning.
By the end of the book, the reader will be able to design and secure modern applications using the public cloud scale, managed services, automation, and built-in security controls. What you will learn
How to secure modern design architectures from APIs, event-driven architectures, and microservices.
How to secure applications using containers and the Kubernetes platform.
How to secure applications using serverless/function-as-a-service.
How to implement key and secrets management as part of cloud-native applications.
How to implement the 12-factor application methodology and immutable infrastructure in cloud-native applications. Who this book is for
This book is for security professionals, software development teams, DevOps and cloud architects, and all those who are designing, maintaining, and securing cloud-native applications. Table of Contents
1. Introduction to Cloud Native Applications
2. Securing Modern Design Architectures
3. Containers and Kubernetes for Cloud Native Applications
4. Serverless for Cloud Native Applications
5. Building Secure CI/CD Pipelines
6. The 12-Factor Application Methodology
7. Using Infrastructure as Code
8. Authorization and Policy as Code
9. Implementing Immutable Infrastructure
10. Encryption and Secrets Management
11. Threat Management in Cloud Native Applications
12. Summary and Key Takeaways
An overview of security in cloud-native applications, such as modern architectures, containers, CI/CD pipeline, and so on.
Using automation, such as infrastructure as code and policy as code, to achieve security at scale.
Implementing security, from encryption and secrets management to threat management. Description
Security for cloud-native applications is an overview of cloud-native applications characteristics from a security point of view, filled with best practices for securing services based on AWS, Azure, and GCP infrastructure.
This book is a practical guide for securing cloud-native applications throughout their lifecycle. It establishes foundational knowledge of cloud services and cloud-native characteristics. It focuses on securing design approaches like APIs, microservices, and event-driven architectures. Specific technologies like containers, Kubernetes, and serverless functions are covered with security best practices. The book emphasizes integrating security throughout development using CI/CD pipelines and IaC tools. It explores policy as code for enforcing security policies and immutable infrastructure for enhanced security posture. Key management and threat detection strategies are also covered. Finally, the book offers a practical example and resources for further learning.
By the end of the book, the reader will be able to design and secure modern applications using the public cloud scale, managed services, automation, and built-in security controls. What you will learn
How to secure modern design architectures from APIs, event-driven architectures, and microservices.
How to secure applications using containers and the Kubernetes platform.
How to secure applications using serverless/function-as-a-service.
How to implement key and secrets management as part of cloud-native applications.
How to implement the 12-factor application methodology and immutable infrastructure in cloud-native applications. Who this book is for
This book is for security professionals, software development teams, DevOps and cloud architects, and all those who are designing, maintaining, and securing cloud-native applications. Table of Contents
1. Introduction to Cloud Native Applications
2. Securing Modern Design Architectures
3. Containers and Kubernetes for Cloud Native Applications
4. Serverless for Cloud Native Applications
5. Building Secure CI/CD Pipelines
6. The 12-Factor Application Methodology
7. Using Infrastructure as Code
8. Authorization and Policy as Code
9. Implementing Immutable Infrastructure
10. Encryption and Secrets Management
11. Threat Management in Cloud Native Applications
12. Summary and Key Takeaways
Wybrane bestsellery
BPB Publications - inne książki
Dzięki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep@helion.pl
Proszę wybrać ocenę!
Proszę wpisać opinię!
Książka drukowana
Proszę czekać...
Oceny i opinie klientów: Security for Cloud Native Applications Eyal Estrin (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.