Hacking Kubernetes: ThreatDriven Analysis and Defense,Used
Hacking Kubernetes: ThreatDriven Analysis and Defense,Used

Hacking Kubernetes: ThreatDriven Analysis and Defense,Used

In Stock
SKU: SONG1492081736
UPC: 0
Brand: Ergodebooks
Condition: Used
Regular price$46.00
Quantity
Add to wishlist
Add to compare
Sold by Ergodebooks, an authorized reseller.

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

Want to run your Kubernetes workloads safely and securely? This practical book provides a threatbased guide to Kubernetes security. Each chapter examines a particular components architecture and potential default settings and then reviews existing highprofile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Martin and Michael Hausenblas share bestpractice configuration to help you harden clusters from possible angles of attack.This book begins with a vanilla Kubernetes installation with builtin defaults. Youll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system. Understand where your Kubernetes system is vulnerable with threat modelling techniques Focus on pods, from configurations to attacks and defenses Secure your cluster and workload traffic Define and enforce policy with RBAC, OPA, and Kyverno Dive deep into sandboxing and isolation techniques Learn how to detect and mitigate supply chain attacks Explore filesystems, volumes, and sensitive information at rest Discover what can go wrong when running multitenant workloads in a cluster Learn what you can do if someone breaks in despite you having controls in place

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

  • Q: How many pages does the book have? A: This book has three hundred eleven pages. It offers in-depth insights into Kubernetes security.
  • Q: What are the dimensions of the book? A: The book measures seven point zero one inches in length, zero point six seven inches in width, and nine point one nine inches in height.
  • Q: What type of binding does this book have? A: This book has a paperback binding. It is designed for easy handling and reading.
  • Q: Who are the authors of this book? A: The authors of this book are Andrew Martin and Michael Hausenblas. They are experts in Kubernetes security.
  • Q: What is the main subject of this book? A: The main subject is Kubernetes security. It explores threat-driven analysis and defense strategies.
  • Q: How do I use this book effectively? A: You can use this book as a guide to secure your Kubernetes workloads. It provides practical strategies and best practices.
  • Q: Is this book suitable for beginners? A: Yes, this book is suitable for beginners. It starts with basic concepts before delving into advanced security techniques.
  • Q: Can I use this book for team training? A: Yes, this book is great for team training. It offers comprehensive insights and best practices for Kubernetes security.
  • Q: What is the reading level of this book? A: The reading level is geared towards IT professionals and developers. Basic knowledge of Kubernetes is recommended.
  • Q: How should I store this book to keep it in good condition? A: Store this book in a cool, dry place. Keep it away from direct sunlight to prevent fading.
  • Q: How do I clean the book if it gets dirty? A: To clean the book, gently wipe the cover with a soft, damp cloth. Avoid using harsh cleaners.
  • Q: What if the book arrives damaged? A: If the book arrives damaged, contact the seller for a return or replacement. Most sellers have return policies in place.
  • Q: Is there a warranty for this book? A: No, books typically do not come with a warranty. However, you can check the return policy.
  • Q: What if I need help understanding a concept in the book? A: If you need help, consider joining online forums or communities focused on Kubernetes. Many users share their insights.
  • Q: Can this book help me with supply chain attacks? A: Yes, this book includes sections on detecting and mitigating supply chain attacks. It's a valuable resource for security.

Recently Viewed