没有合适的资源?快使用搜索试试~ 我知道了~
Hacking Kubernetes.pdf
1.该资源内容由用户上传,如若侵权请联系客服进行举报
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
版权申诉
0 下载量 36 浏览量
2024-10-14
16:43:16
上传
评论
收藏 17.09MB PDF 举报
温馨提示
Hacking Kubernetes.pdf
资源推荐
资源详情
资源评论
Hacking
Kubernetes
Threat-Driven Analysis and Defense
Hacking Kubernetes
Threat-Driven Analysis and Defense
Andrew Martin and Michael Hausenblas
Hacking Kubernetes
by Andrew Martin and Michael Hausenblas
Copyright © 2022 Andrew Martin and Michael Hausenblas. All rights
reserved.
Printed in the United States of America.
Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North,
Sebastopol, CA 95472.
O’Reilly books may be purchased for educational, business, or sales
promotional use. Online editions are also available for most titles
(http://oreilly.com). For more information, contact our corporate/institutional
sales department: 800-998-9938 or corporate@oreilly.com.
Acquisitions Editor: John Devins
Development Editor: Angela Rufino
Production Editor: Beth Kelly
Copyeditor: Kim Cofer
Proofreader: Justin Billing
Indexer: nSight, Inc.
Interior Designer: David Futato
Cover Designer: Karen Montgomery
Illustrator: Kate Dullea
October 2021: First Edition
Revision History for the First Edition
2021-10-13: First Release
See http://oreilly.com/catalog/errata.csp?isbn=9781492081739 for release
details.
The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Hacking
Kubernetes, the cover image, and related trade dress are trademarks of
O’Reilly Media, Inc.
The views expressed in this work are those of the authors, and do not
represent the publisher’s views. While the publisher and the authors have
used good faith efforts to ensure that the information and instructions
contained in this work are accurate, the publisher and the authors disclaim all
responsibility for errors or omissions, including without limitation
responsibility for damages resulting from the use of or reliance on this work.
Use of the information and instructions contained in this work is at your own
risk. If any code samples or other technology this work contains or describes
is subject to open source licenses or the intellectual property rights of others,
it is your responsibility to ensure that your use thereof complies with such
licenses and/or rights.
978-1-492-08173-9
[LSI]
Preface
Welcome to Hacking Kubernetes, a book for Kubernetes practitioners who
want to run their workloads securely and safely. At time of writing,
Kubernetes has been around for some six years, give or take. There are over
one hundred certified Kubernetes offerings available, such as distributions
and managed services. With an increasing number of organizations deciding
to move their workloads to Kubernetes, we thought we’d share our
experiences in this space, to help make your workloads more secure and safe
to deploy and operate. Thank you for joining us on this journey, and we hope
you have as much fun reading this book and applying what you learn as we
had writing it.
In this preface, we will paint a picture of our intended audience, talk about
why we wrote the book, and explain how we think you should go about using
it by providing a quick content guide. We will also go over some
administrative details like Kubernetes versions and conventions used.
About You
To get most out of the book, we assume that you either have a DevOps role,
are a Kubernetes platform person, a cloud native architect, a site reliability
engineer (SRE), or something related to being a chief information security
officer (CISO). We further assume that you’re interested in being hands-on—
while we discuss threats and defenses in principle, we try our best to
demonstrate them at the same time and point you to tools that can help you.
At this point we also want to make sure you understand that the book you’re
reading is targeting advanced topics. We assume that you’re already familiar
with Kubernetes, and specifically Kubernetes security topics, at least on a
surface level. In other words, we don’t go into much detail about how things
work, but summarize or recap important concepts or mechanisms on a per-
chapter basis.
剩余485页未读,继续阅读
资源评论
资料库01
- 粉丝: 437
- 资源: 2647
下载权益
C知道特权
VIP文章
课程特权
开通VIP
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功