Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Datasource
Material
Language
Years
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (165 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Rice, Liz Container security
    RVK:
    Keywords: Electronic books ; local ; Container ; Computersicherheit
    Abstract: Many organizations now run applications in cloud native environments, using containers and orchestration to facilitate scalability and resilience. But how do you know whether your deployment is secure? To fully grasp the security implications of containers and their operation, you'll need an understanding of what they are and how they work. In this excerpt from her forthcoming book Container Security, author Liz Rice takes you through the mechanisms that isolate and protect your applications within each container. This book as a whole looks at the building blocks and security boundaries commonly used in container-based systems and how they're constructed in the Linux operating system. In the featured chapter, "Container Isolation," you'll learn how namespaces limit the set of files and directories that particular container processes can see, functionally isolating them from other operations. Learn how a container is actually a Linux process with a restricted view of the machine it's running on Explore the different namespaces typically used to create Linux containers Examine how containerized processes are isolated from the host and other containerized processes
    Note: Online resource; Title from title page (viewed May 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 15 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: What’s in store for infrastructure and operations in the future? Where’s the field headed? And what technologies will take us there? Join us for this recording of a live event covering some of the key changes you can expect to see in the world of infrastructure and operations. You’ll learn about the trends and new technologies that will shape how you deliver software and meet the needs of your business and customers in the coming years, with a focus on the emerging ideas and tools that you can make use of right now. Whether you’re looking for cutting-edge techniques for today or want to get ahead of the game for tomorrow, this is the event for you. What you’ll learn and how you can apply it Explore the technologies that will shape the future of infrastructure and operations Learn how to employ new technologies and stay ahead of the curve This recording of a live event is for you because… You’re a developer who wants to know what’s coming next for infrastructure and operations. You want to better understand new technologies such as data mesh and eBPF. You need to apply continuous delivery principles to make the end-to-end process of developing and deploying ML systems more repeatable and reliable. Recommended follow-up: Read Data Mesh (book) Read Container Security (book) Read Building Machine Learning Pipelines (book) Read Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, second edition (book) Read Linux Observability with BPF (book)
    Note: Online resource; Title from title screen (viewed November 17, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    ISBN: 9798341619524
    Language: Undetermined
    Pages: 1 online resource
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (52 pages) , color illustrations
    Edition: First edition.
    DDC: 005.3
    Keywords: Application software Development ; Automation ; Open source software ; Computer security ; Computer Security ; Logiciels d'application ; Développement ; Automatisation ; Logiciels libres ; Sécurité informatique ; Electronic books
    Abstract: In just the past few years, the extended Berkeley Packet Filter (eBPF) has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing. With this report, Liz Rice dives into eBPF and explains how this framework enables networking, security, and observability tooling for modern compute environments. SREs, ops engineers, and engineering team leads will learn what eBPF is and why it's so powerful. Rice, chief open source officer at Isovalent, shows you how to load and run custom eBPF programs within the kernel of your operating system, modifying the way the kernel behaves. You'll learn what's required to build eBPF-enabled tools, and why eBPF has become so prevalent in such a short period of time. With this report, you will: Learn why the ability to dynamically change the kernel behavior is so useful, and how eBPF is a game-changer when it comes to making kernel changes See what's involved in writing eBPF code with a programming example to understand how the process works Explore an overview of eBPF-enabled tools that you can use to instrument your cloud native applications.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Orig.schr. Ausgabe: 初版.
    Title: 入門 eBPF : : Linuxカーネルの可視化と機能拡張 /
    Publisher: 東京都新宿区 : オライリー・ジャパン
    ISBN: 9784814400560 , 481440056X
    Language: Japanese
    Pages: 1 online resource (228 pages)
    Edition: Shohan.
    Uniform Title: Learning eBPF
    DDC: 005.1
    Keywords: Linux ; Application software Development ; Automation ; Open source software ; Computer security ; Logiciels d'application ; Développement ; Automatisation ; Logiciels libres ; Sécurité informatique
    Abstract: What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves. It's an extraordinary platform for building a whole new generation of security, observability, and networking tools. This practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works. Author Liz Rice, chief open source officer with cloud native networking and security specialists Isovalent, also provides a foundation for those who want to explore writing eBPF programs themselves.
    Note: Includes bibliographical references , In Japanese.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Sebastopol, California] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application software Development ; Automation ; Open source software ; Computer security ; Logiciels d'application ; Développement ; Automatisation ; Logiciels libres ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: eBPF is a revolutionary technology that allows developers, software engineers, and security engineers to collect customized information about how an app is behaving without having to change the app in any way, by observing it from within the kernel. This makes it a powerful platform for building the next generation of security, observability and networking tools. Most people will experience eBPF through the tools built on it, such as Cilium, bpftrace, and Tetragon. As well as getting an introduction to these tools and an understanding of how eBPF makes them so powerful, you’ll see eBPF code examples that will give you a mental model for how these complex tools make use of the eBPF platform. This course is designed for professionals who want to get hands-on with a dynamic new technology to get a better understanding of how it works and what its possibilities are.
    Note: Online resource; title from title details screen (O’Reilly, viewed July 1, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    Series Statement: O'Reilly superstream series
    DDC: 005.3
    Keywords: Application software Development ; Automation ; Open source software ; Computer security ; Computer security ; Open source software ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Join us for a special conversation on the extended Berkeley Packet Filter (eBPF) with Sam Newman and Isovalent chief open source officer Liz Rice. You'll learn how eBPF has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing, why the ability to dynamically change the kernel behavior is so useful (and why eBPF is such a game changer), and much more. Sam and Liz talk about eBPF, container security, infrastructure and ops, and their own career journeys. They'll also spend a few minutes covering the trends that are influencing infrastructure, then tell you what you need to know to stay ahead of the curve. What you'll learn and how you can apply it Explore the origins of and need for eBPF See what's coming next for infrastructure and ops This recording of a live event is for you because... You want to better understand how to implement eBPF at your organization. You're looking for ways to improve your software delivery time and team structure. Recommended follow-up: Read What Is eBPF? (report) Read Container Security (book) Read Security Observability with eBPF (report) Attend Infrastructure & Ops Superstream: Linux Fundamentals (live event on September 14).
    Note: Online resource; title from title details screen (O'Reilly, viewed August 23, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 audio file (01 hr., 03 min.))
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application software Development ; Automation ; Open source software ; Computer security ; Computer security ; Open source software ; Audiobooks
    Abstract: Join us for a special conversation on the extended Berkeley Packet Filter (eBPF) with Sam Newman and Isovalent chief open source officer Liz Rice. You'll learn how eBPF has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing, why the ability to dynamically change the kernel behavior is so useful (and why eBPF is such a game changer), and much more.
    Note: Online resource; title from title details screen (O'Reilly, viewed November 8, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Keywords: Electronic data processing ; Distributed processing ; Application software ; Development ; Open source software ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This practical ebook walks you through Kubernetes security features-including when to use what-and shows you how to augment those features with container image best practices and secure network communication. Liz Rice from Aqua Security and Michael Hausenblas from Red Hat not only describe practical security techniques for Kubernetes but also maintain an accompanying website. Developers will learn how to build container images with security in mind, and ops folks will pick up techniques for configuring and operating a Kubernetes cluster more securely. Explore security concepts including defense in depth, least privilege, and limiting the attack surface Safeguard clusters by securing worker nodes and control plane components, such as the API server and the etcd key value store Learn how Kubernetes uses authentication and authorization to grant fine-grained access Secure container images against known vulnerabilities and abuse by third parties Examine security boundaries and policy enforcement features for running containers securely Learn about the options for handling secret information such as credentials Delve into advanced topics such as monitoring, alerting, and auditing, as well as sandboxing and runtime protection
    Note: Description based on online resource; title from title page (Safari, viewed January 17, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: 1st edition.
    Keywords: Computer software ; Development ; Go (Computer program language) ; Electronic data processing ; Electronic books ; Electronic books ; local
    Abstract: Are you a Go programmer looking to introduce Docker containers into your workflow? In this lesson, you'll learn how to set up a containerized development environment that rebuilds Go code automatically as you edit it. You'll learn how to use tools such as Realize, and how to generate a small and efficient container image for production distribution using Docker Multistage Builds.
    Note: Description based on online resource; title from title page (viewed January 29, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...