Hacking Kubernetes
Threat-Driven Analysis and Defense
| Price | $37.04 - $43.45
|
| Rating | |
| Authors | Andrew Martin, Michael Hausenblas |
| Publisher | O'Reilly Media |
| Published | 2021 |
| Pages | 314 |
| Language | English |
| Format | Paper book / ebook (PDF) |
| ISBN-10 | 1492081736 |
| ISBN-13 | 9781492081739 |
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Martin and Michael Hausenblas share best-practice configuration to help you harden clusters from possible angles of attack.
This book begins with a vanilla Kubernetes installation with built-in defaults. You'll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system.
Understand where your Kubernetes system is vulnerable with threat modelling techniques; Focus on pods, from configurations to attacks and defenses; Secure your cluster and workload traffic; Define and enforce policy with RBAC, OPA, and Kyverno; Dive deep into sandboxing and isolation techniques; Learn how to detect and mitigate supply chain attacks; Explore filesystems, volumes, and sensitive information at rest; Discover what can go wrong when running multitenant workloads in a cluster; Learn what you can do if someone breaks in despite you having controls in place.
- Andrew Martin
- Michael Hausenblas (5 books)
4 5 31
Similar Books
by Attilathedud
Hacking games requires a unique combination of reversing, memory management, networking, and security skills. Even as ethical hacking has exploded in popularity, game hacking still occupies a very small niche in the wider security community. While it may not have the same headline appeal as a Chrome 0day or a massive data leak, the unique...
Free ebook | Publisher: Self-publishing | Release: 2021
Managing Kubernetes Traffic with F5 Nginx
by Amir Rawdat
Microservices architectures introduce several benefits to the application development and delivery process. Microservices-based apps are easier to build, test, maintain, and scale. They also reduce downtime through better fault isolation.While container-based microservices apps have profoundly changed the way DevOps teams deploy applicati...
Free ebook | Publisher: Self-publishing | Release: 2022
Hacking Exposed Wireless, 2nd Edition ![]()
![]()
![]()
![]()
![]()
by Johnny Cache, Joshua Wright, Vincent Liu
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and...
Price: $3.99 | Publisher: McGraw-Hill | Release: 2010
Managing Cloud Native Data on Kubernetes
by Jeff Carpenter, Patrick McFadin
Is Kubernetes ready for stateful workloads? This open source system has become the primary platform for deploying and managing cloud native applications. But because it was originally designed for stateless workloads, working with data on Kubernetes has been challenging. If you want to avoid the inefficiencies and duplicative costs of hav...
Price: $50.63 | Free ebook | Publisher: O'Reilly Media | Release: 2023
Cloud Native DevOps with Kubernetes ![]()
![]()
![]()
![]()
![]()
by Justin Domingus, John Arundel
Kubernetes has become the operating system of today's cloud native world, providing a reliable and scalable platform for running containerized workloads. In this friendly, pragmatic book, cloud experts Justin Domingus and John Arundel show you what Kubernetes can do-and what you can do with it.This updated second edition guides you t...
Price: $49.42 | Free ebook | Publisher: O'Reilly Media | Release: 2022
Beginning Ethical Hacking with Kali Linux ![]()
![]()
![]()
![]()
![]()
by Sanjib Sinha
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you'll move on to an introduction to...
Price: $32.60 | Publisher: Apress | Release: 2018
by Navin Sabharwal, Piyush Pandey
Discover methodologies and best practices for getting started with Google Kubernetes Engine (GKE). This book helps you understand how GKE provides a fully managed environment to deploy and operate containerized applications on Google Cloud infrastructure.You will see how Kubernetes makes it easier for users to manage clusters and the cont...
Price: $33.72 | Publisher: Apress | Release: 2020
by Benjamin Schmeling, Maximilian Dargatz
Building applications for Kubernetes is both a challenge and an opportunity - a challenge because the options and complexity to develop for Kubernetes are evolving rapidly, an opportunity because, if done right, your applications will go into production quicker, scale easier, and run smoother.This book outlines the impact of Containers an...
Price: $44.99 | Publisher: Apress | Release: 2022









