Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
EUR 24,97
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 24,79
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: New.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 43,32
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
EUR 48,13
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. KlappentextrnrnThis book discusses many strategies that can be used by developers to improve their DevSecOps and container security skills. It is intended for those who are active in software development. After reading this book, readers will di.
Anbieter: Chiron Media, Wallingford, Vereinigtes Königreich
EUR 38,22
Währung umrechnenAnzahl: 10 verfügbar
In den WarenkorbPF. Zustand: New.
Verlag: Bpb Publications 2/18/2022, 2022
ISBN 10: 9355511183 ISBN 13: 9789355511188
Sprache: Englisch
Anbieter: BargainBookStores, Grand Rapids, MI, USA
EUR 45,02
Währung umrechnenAnzahl: 5 verfügbar
In den WarenkorbPaperback or Softback. Zustand: New. Implementing DevSecOps with Docker and Kubernetes: An Experiential Guide to Operate in the DevOps Environment for Securing and Monitoring Container Ap 1.74. Book.
Anbieter: Goodwill San Antonio, San Antonio, TX, USA
EUR 23,37
Währung umrechnenAnzahl: 1 verfügbar
In den Warenkorbpaperback. Zustand: Good. Good Reading Copy, May have minor shelf wear, Fast Shipping - Safe and Secure in Mailer.
Anbieter: Lucky's Textbooks, Dallas, TX, USA
EUR 40,65
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
EUR 44,02
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbPAP. Zustand: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Anbieter: PBShop.store US, Wood Dale, IL, USA
EUR 49,66
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbPAP. Zustand: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 59,14
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - This book discusses many strategies that can be used by developers to improve their DevSecOps and container security skills. It is intended for those who are active in software development. After reading this book, readers will discover how Docker and Kubernetes work from a security perspective. The book begins with a discussion of the DevSecOps tools ecosystem, the primary container platforms and orchestration tools that you can use to manage the lifespan and security of your apps. Among other things, this book discusses best practices for constructing Docker images, discovering vulnerabilities, and better security. The book addresses how to examine container secrets and networking. Backed with examples, the book demonstrates how to manage and monitor container-based systems, including monitoring and administration in Docker. In the final section, the book explains Kubernetes' architecture and the critical security threats inherent in its components. Towards the end, it demonstrates how to utilize Prometheus and Grafana to oversee observability and monitoring in Kubernetes management. TABLE OF CONTENTS 1. Getting Started with DevSecOps 2. Container Platforms 3. Managing Containers and Docker Images 4. Getting Started with Docker Security 5. Docker Host Security 6. Docker Images Security 7. Auditing and Analyzing Vulnerabilities in Docker Containers 8. Managing Docker Secrets and Networking 9. Docker Container Monitoring 10. Docker Container Administration 11. Kubernetes Architecture 12. Kubernetes Security 13. Auditing and Analyzing Vulnerabilities in Kubernetes 14. Observability and Monitoring in Kubernetes.