Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036

Cloud Native Software Security Handbook: Unleash the power of cloud native tools for robust security in modern applications

Sprog
Engelsk
Format
Kategori

Fakta

For cloud security engineers, it’s crucial to look beyond the limited managed services provided by cloud vendors and make use of the wide array of cloud native tools available to developers and security professionals, which enable the implementation of security solutions at scale. This book covers technologies that secure infrastructure, containers, and runtime environments using vendor-agnostic cloud native tools under the Cloud Native Computing Foundation (CNCF).

The book begins with an introduction to the whats and whys of the cloud native environment, providing a primer on the platforms that you’ll explore throughout. You’ll then progress through the book, following the phases of application development. Starting with system design choices, security trade-offs, and secure application coding techniques that every developer should be mindful of, you’ll delve into more advanced topics such as system security architecture and threat modelling practices. The book concludes by explaining the legal and regulatory frameworks governing security practices in the cloud native space and highlights real-world repercussions that companies have faced as a result of immature security practices.

By the end of this book, you'll be better equipped to create secure code and system designs.

© 2023 Packt Publishing (E-bog): 9781837636525

Release date

E-bog: 25. august 2023

Andre kan også lide...

  1. Microsoft Azure Security Technologies Certification and Beyond: Gain practical skills to secure your Azure environment and pass the AZ-500 exam David Okeyode
  2. Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments David Okeyode
  3. Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats David Álvarez Pérez
  4. Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting Roberto Martinez
  5. Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture Benjamin Kovacevic
  6. Learn Red - Fundamentals of Red : Get up and running with the Red language for full-stack development: Get up and running with the Red language for full-stack development Ivo Balbaert
  7. Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software Uriel Kosayev
  8. Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications Kim Crawley
  9. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide: Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook. Lee Allen
  10. TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS Dr. Paul Duplys
  11. Attacking and Exploiting Modern Web Applications: Discover the mindset, techniques, and tools to perform modern web attacks and exploitation Simone Onofri
  12. Cloud Security Handbook: Find out how to effectively secure cloud environments using AWS, Azure, and GCP Eyal Estrin
  13. Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities Jason Deyalsingh
  14. Network Vulnerability Assessment: Identify security loopholes in your network's infrastructure Sagar Rahalkar
  15. Executive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program Jason Brown
  16. Hack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles Ken Underhill
  17. The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity Cesar Bravo
  18. Critical Infrastructure Security: Cybersecurity lessons learned from real-world breaches Soledad Antelada Toledano
  19. Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs Mostafa Yahia
  20. Azure Security Cookbook: Practical recipes for securing Azure resources and operations Steve Miles
  21. Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization Tim Rains
  22. A CISO Guide to Cyber Resilience: A how-to guide for every CISO to build a resilient security program Debra Baker
  23. Data Science for Malware Analysis: A comprehensive guide to using AI in detection, analysis, and compliance Shane Molinari
  24. Microsoft Defender for Cloud Cookbook: Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture Sasha Kranjac
  25. Learn Ethereum.: A practical guide to help developers set up and run decentralized applications with Ethereum 2.0 Xun (Brian) Wu
  26. Architecting Cloud-Native Serverless Solutions: Design, build, and operate serverless solutions on cloud and open source platforms Safeer Cm
  27. Securing Industrial Control Systems and Safety Instrumented Systems: A practical guide for safeguarding mission and safety critical systems Jalal Bouhdada
  28. Security Automation with Python: Practical Python solutions for automating and scaling security operations Corey Charles Sr.
  29. Hands-On AWS Penetration Testing with Kali Linux: Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation Karl Gilbert
  30. Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics Yuri Diogenes
  31. Advanced Network Simulations Simplified: Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3 Dr Anil Kumar Rangisetti
  32. Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture Lester Nichols
  33. Ingenium: Five Machines That Changed the World Mark Denny
  34. Building AI Intensive Python Applications: Create intelligent apps with LLMs and vector databases Rachelle Palmer
  35. The History of the Port of London: A Vast Emporium of All Nations Peter Stone
  36. Blaming Technology: The Irrational Search for Scapegoats Samuel C. Florman
  37. Edsger Wybe Dijkstra: His Life, Work, and Legacy Tony Hoare
  38. The Rise of the Computer State: The Threat to Our Freedoms, Our Ethics and our Democratic Process David Burnham
  39. Privacy-Preserving Machine Learning: A use-case-driven approach to building and protecting ML pipelines from privacy and security threats Srinivasa Rao Aravilli
  40. Unveiling the NIST Risk Management Framework (RMF): A practical guide to implementing RMF and managing risks in your organization Thomas Marsland
  41. Windows Server 2016 Automation with PowerShell Cookbook - Second Edition Thomas Lee
  42. Code Work: Hacking across the US/México Techno-Borderlands Héctor Beltrán
  43. Practical Linux Security Cookbook: Secure your Linux environment from modern-day attacks with practical recipes Tajinder Kalsi
  44. Brain Gain: Technology and the Quest for Digital Wisdom Marc Prensky
  45. The Future of Us: The Science of What We'll Eat, Where We'll Live, and Who We'll Be Jay Ingram
  46. The History of the Future: Oculus, Facebook, and the Revolution That Swept Virtual Reality Blake J. Harris
  47. Hands-On Deep Learning with TensorFlow Dan Van Boxel
  48. Not Working: Where Have All the Good Jobs Gone? David G. Blanchflower
  49. Covenants Made Simple: Understanding God's Unfolding Promises to His People Jonty Rhodes

Vælg dit abonnement

  • Over 600.000 titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Flex

For dig som vil prøve Mofibo.

89 kr. /måned
  • 1 konto

  • 20 timer/måned

  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis
Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned
  • 1 konto

  • 100 timer/måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

149 kr. /måned
  • 1 konto

  • Ubegrænset adgang

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned
  • 2-6 konti

  • 100 timer/måned pr. konto

  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

2 konti

179 kr. /måned
Start tilbuddet