Hacking Kubernetes : threat-driven analysis and defense / Andrew Martin and Michael Hausenblas
Material type:
- text
- still image
- unmediated
- volume
- 9781492081739
- 1492081736
- 005.3 23
- QA76.76.A65 M35 2022
Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
![]() |
RLKU Library & Information Resource Center | 005 MAR (Browse shelf(Opens below)) | Available | 14223 | |
![]() |
RLKU Library & Information Resource Center | 005 MAR (Browse shelf(Opens below)) | Available | 14224 | |
![]() |
RLKU Library & Information Resource Center | 005 MAR (Browse shelf(Opens below)) | Available | 14225 | |
![]() |
RLKU Library & Information Resource Center | 005 MAR (Browse shelf(Opens below)) | Available | 14226 | |
![]() |
RLKU Library & Information Resource Center | 005 MAR (Browse shelf(Opens below)) | Available | 14227 | |
![]() |
RLKU Library & Information Resource Center | 005 MAR (Browse shelf(Opens below)) | Available | 14228 |
Browsing RLKU Library & Information Resource Center shelves Close shelf browser (Hides shelf browser)
Includes bibliographical references and index.
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Martin and Michael Hausenblas share best-practice configuration to help you harden clusters from possible angles of attack. This book begins with a vanilla Kubernetes installation with built-in defaults. You'll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system. - - Source of the Library of Congress.
There are no comments on this title.