Computer Security

By 
In stock
50000
All Indian Reprints of O'Reilly are printed in Grayscale DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build secure and resilient applications, you have to be equipped with security knowledge. Enter security as code. In this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to secure any application and infrastructure you want to deploy. With Security as Code , you'll learn how to create a secure containerized application with Kubernetes using CI/CD tooling from AWS and open source providers. This practical book also provides common patterns and methods to securely develop infrastructure for resilient and highly available backups that you can restore with just minimal manual intervention. Learn the tools of the trade, using Kubernetes and the AWS Code Suite Set up infrastructure as code and run scans to detect misconfigured resources in your code Create secure logging patterns with CloudWatch and other tools Restrict system access to authorized users with role-based access control (RBAC) Inject faults to test the resiliency of your application with AWS Fault Injector or open source tooling Learn how to pull everything together into one deployment
AuthorBK Sarthak Das, Virginia Chu BindingPaperback
All Indian Reprints of O'Reilly are printed in Grayscale Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of considerations, from infrastructure choices and cluster configuration to deployment controls and runtime and network security. With this practical book, you'll learn how to adopt a holistic security and observability strategy for building and securing cloud native applications running on Kubernetes.
AuthorBrendan Creane Author 2Amit Gupta
All Indian Reprints of O'Reilly are printed in Grayscale Security is usually an afterthought when organizations design microservices for cloud systems. Most companies today are exposed to potential security threats, but their responses are often more reactive than proactive. This leads to unnecessarily complicated systems that are hard to implement and even harder to manage and scale. Author Gaurav Raje shows you how to build highly secure systems on AWS without increasing overhead.
AuthorGuarav Raje BindingPaperback
All Indian Reprints of O'Reilly are printed in Grayscale If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manager's guide offers a new approach to building and maintaining an information security program that's both effective and easy to follow.
AuthorTodd Barnum BindingPaperback
All Indian Reprints of O'Reilly are printed in Grayscale Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, this book will help you gain a better understanding of how you can apply core threat modeling concepts to your practice to protect your systems against threats. 
AuthorIzar Tarandach Author 2Matthew J. Coles