Security & Privacy

By 
In stock
50000
All Indian Reprints of O'Reilly are printed in Grayscale DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build secure and resilient applications, you have to be equipped with security knowledge. Enter security as code. In this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to secure any application and infrastructure you want to deploy. With Security as Code , you'll learn how to create a secure containerized application with Kubernetes using CI/CD tooling from AWS and open source providers. This practical book also provides common patterns and methods to securely develop infrastructure for resilient and highly available backups that you can restore with just minimal manual intervention. Learn the tools of the trade, using Kubernetes and the AWS Code Suite Set up infrastructure as code and run scans to detect misconfigured resources in your code Create secure logging patterns with CloudWatch and other tools Restrict system access to authorized users with role-based access control (RBAC) Inject faults to test the resiliency of your application with AWS Fault Injector or open source tooling Learn how to pull everything together into one deployment
AuthorBK Sarthak Das, Virginia Chu BindingPaperback
All Indian Reprints of O'Reilly are printed in Grayscale Over the past two decades, the booming ecommerce and fintech industries have become a breeding ground for fraud. Organizations that conduct business online are constantly engaged in a cat-and-mouse game with these invaders. In this practical book, Gilit Saporta and Shoshana Maraney draw on their fraud-fighting experience to provide best practices, methodologies, and tools to help you detect and prevent fraud and other malicious activities.
AuthorGilit Saporta Author 2Shoshana Maraney
All Indian Reprints of O'Reilly are printed in Grayscale Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of considerations, from infrastructure choices and cluster configuration to deployment controls and runtime and network security. With this practical book, you'll learn how to adopt a holistic security and observability strategy for building and securing cloud native applications running on Kubernetes.
AuthorBrendan Creane Author 2Amit Gupta
All Indian Reprints of O'Reilly are printed in Grayscale Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by working through everyday security problems.
AuthorChristina Morillo BindingPaperback
All Indian Reprints of O'Reilly are printed in Grayscale Security is usually an afterthought when organizations design microservices for cloud systems. Most companies today are exposed to potential security threats, but their responses are often more reactive than proactive. This leads to unnecessarily complicated systems that are hard to implement and even harder to manage and scale. Author Gaurav Raje shows you how to build highly secure systems on AWS without increasing overhead.
AuthorGuarav Raje BindingPaperback
All Indian Reprints of O'Reilly are printed in Grayscale Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS services like Microsoft 365, Google Workspace, and Salesforce; and persistent data created by Kubernetes and container workloads.
AuthorW. Curtis Preston BindingPaperback
All Indian Reprints of O'Reilly are printed in Grayscale If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manager's guide offers a new approach to building and maintaining an information security program that's both effective and easy to follow.
AuthorTodd Barnum BindingPaperback
  • Security & Privacy