Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Keywords: Go (Computer program language) ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: This report shows how Go programmers can build small, efficient containers for their Go code. It explains what's inside a container image and walks you through how to build and run containers for your Go projects. What you'll learn-and how you can apply it You'll learn how to containerize the Go code you're working on, with worked examples to show you exactly what to do. You'll see how to build a container from the scratch image, and why that's a good idea for Go code. You'll also learn how to set up port bindings so that the outside work can connect to the code running in your container, and how to pass in configuration environment variables. This report is for you because... You've heard of containers, but you're not sure whether they're right for your project, or how you would use them in your daily workflow. Prerequisites We'll assume you're comfortable with the command line We're using Go in this lesson but many of the concepts are applicable to other languages as well Materials or downloads needed in advance Install Docker Install the Go tools
    Note: Description based on online resource; title from title page (Safari, viewed May 5, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (165 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Rice, Liz Container security
    Keywords: Electronic books ; local ; Container ; Computersicherheit
    Abstract: Many organizations now run applications in cloud native environments, using containers and orchestration to facilitate scalability and resilience. But how do you know whether your deployment is secure? To fully grasp the security implications of containers and their operation, you'll need an understanding of what they are and how they work. In this excerpt from her forthcoming book Container Security, author Liz Rice takes you through the mechanisms that isolate and protect your applications within each container. This book as a whole looks at the building blocks and security boundaries commonly used in container-based systems and how they're constructed in the Linux operating system. In the featured chapter, "Container Isolation," you'll learn how namespaces limit the set of files and directories that particular container processes can see, functionally isolating them from other operations. Learn how a container is actually a Linux process with a restricted view of the machine it's running on Explore the different namespaces typically used to create Linux containers Examine how containerized processes are isolated from the host and other containerized processes
    Note: Online resource; Title from title page (viewed May 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'REILLY MEDIA
    ISBN: 9781098135096 , 1098135091
    Language: English
    Pages: 1 online resource
    Parallel Title: Erscheint auch als
    DDC: 005.3
    Keywords: Application software Development ; Automation ; Open source software ; Computer security
    Abstract: What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves. It's an extraordinary platform for building a whole new generation of security, observability, and networking tools. This practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works. Author Liz Rice, chief open source officer with cloud native networking and security specialists Isovalent, also provides a foundation for those who want to explore writing eBPF programs themselves.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: 1st edition.
    Keywords: Computer software ; Development ; Go (Computer program language) ; Electronic data processing ; Electronic books ; Electronic books ; local
    Abstract: Are you a Go programmer looking to introduce Docker containers into your workflow? In this lesson, you'll learn how to set up a containerized development environment that rebuilds Go code automatically as you edit it. You'll learn how to use tools such as Realize, and how to generate a small and efficient container image for production distribution using Docker Multistage Builds.
    Note: Description based on online resource; title from title page (viewed January 29, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: First edition.
    Keywords: Go (Computer program language) ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Docker's catchphrase for its containers is compelling: "Build, Ship and Run Any App, Anywhere." Go already has some of those attributes built in, including cross-compilation and the production of single executable files without dependencies. Are there any reasons, then, for Go programmers to use containers to deploy code? In this lesson, veteran developer Liz Rice outlines several advantages that containers can provide for Go programmers-such as how they help you restrict the resources that your code can access, and how you can use them to run and test your software locally with other components. You'll then look at some cases where containers wouldn't add any benefit at all. As always, it's important to use the right tool for the job, and containers can offer advantages for Go programmers in the right circumstances. This lesson provides some helpful guidelines.
    Note: Description based on online resource; title from title page (Safari, viewed February 7, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Orig.schr. Ausgabe: 初版.
    Title: 入門 eBPF : : Linuxカーネルの可視化と機能拡張 /
    Publisher: 東京都新宿区 : オライリー・ジャパン
    ISBN: 9784814400560 , 481440056X
    Language: Japanese
    Pages: 1 online resource (228 pages)
    Edition: Shohan.
    Uniform Title: Learning eBPF
    DDC: 005.1
    Keywords: Linux ; Application software Development ; Automation ; Open source software ; Computer security ; Logiciels d'application ; Développement ; Automatisation ; Logiciels libres ; Sécurité informatique
    Abstract: What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves. It's an extraordinary platform for building a whole new generation of security, observability, and networking tools. This practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works. Author Liz Rice, chief open source officer with cloud native networking and security specialists Isovalent, also provides a foundation for those who want to explore writing eBPF programs themselves.
    Note: Includes bibliographical references , In Japanese.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 13 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: About the Infrastructure & Ops Superstream Series : This four-part series of half-day online events covers the most challenging and promising topics facing those working in infrastructure and operations today: site reliability engineering, security, Kubernetes, and microservices. Security is everyone’s responsibility. These sessions will get you up to speed with key techniques and best practices for securing your applications, systems, and organization. Discover how to better assess threats and develop a security-aware mindset. Learn how to detect and prevent risks and find application vulnerabilities. And explore pragmatic approaches for adding security to your delivery pipeline. What you'll learn-and how you can apply it Explore the fundamentals of security, including how to improve security within your organization Learn how to assess potential security risks that could affect your deployments with containers Understand how security should work with DevOps Discover how to evaluate your cloud environment for misconfiguration vulnerabilities and address them without slowing down innovation or removing the power that cloud computing delivers This Superstream is for you because... You’re a developer new to or looking to enter a security role. You want to learn about DevSecOps. You want to get started with bug hunting. You want to become well-versed in the foundations and best practices of security. Prerequisites: Come with your questions Have a pen and paper handy to capture notes, insights, and inspiration Recommended follow-up: Read Container Security (book) Read Web Application Security (book) Read Practical Cloud Security (book) Take Windows Network Security Fundamentals (live online training course with Glenn Weadock)
    Note: Online resource; Title from title screen (viewed October 5, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Helion | Boston, MA : Safari
    ISBN: 9788328372283
    Language: English , Polish
    Pages: 1 online resource (184 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Autorka Liz Rice, wiceprezydent działu Open Source Engineering w firmie Aqua Security, pokazała, jak w systemie Linux zostały skonstruowane komponenty, na podstawie których są najczęściej tworzone kontenery. Dzięki tej książce zrozumiesz, co się dzieje podczas wdrażania kontenerów i poznasz potencjalne niebezpieczeństwa zagrażające Twoim wdrożeniom. Jeżeli za pomocą poleceń kubectrl lub docker uruchamiasz aplikacje w kontenerach i używasz poleceń powłoki systemu Linux, takich jak ps i grep, masz wiedzę wystarczającą do rozpoczęcia lektury.
    Note: Online resource; Title from title page (viewed February 10, 2025) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    Series Statement: O'Reilly superstream series
    DDC: 005.3
    Keywords: Application software Development ; Automation ; Open source software ; Computer security ; Computer security ; Open source software ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Join us for a special conversation on the extended Berkeley Packet Filter (eBPF) with Sam Newman and Isovalent chief open source officer Liz Rice. You'll learn how eBPF has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing, why the ability to dynamically change the kernel behavior is so useful (and why eBPF is such a game changer), and much more. Sam and Liz talk about eBPF, container security, infrastructure and ops, and their own career journeys. They'll also spend a few minutes covering the trends that are influencing infrastructure, then tell you what you need to know to stay ahead of the curve. What you'll learn and how you can apply it Explore the origins of and need for eBPF See what's coming next for infrastructure and ops This recording of a live event is for you because... You want to better understand how to implement eBPF at your organization. You're looking for ways to improve your software delivery time and team structure. Recommended follow-up: Read What Is eBPF? (report) Read Container Security (book) Read Security Observability with eBPF (report) Attend Infrastructure & Ops Superstream: Linux Fundamentals (live event on September 14).
    Note: Online resource; title from title details screen (O'Reilly, viewed August 23, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (52 pages) , color illustrations
    Edition: First edition.
    DDC: 005.3
    Keywords: Application software Development ; Automation ; Open source software ; Computer security ; Computer Security ; Logiciels d'application ; Développement ; Automatisation ; Logiciels libres ; Sécurité informatique ; Electronic books
    Abstract: In just the past few years, the extended Berkeley Packet Filter (eBPF) has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing. With this report, Liz Rice dives into eBPF and explains how this framework enables networking, security, and observability tooling for modern compute environments. SREs, ops engineers, and engineering team leads will learn what eBPF is and why it's so powerful. Rice, chief open source officer at Isovalent, shows you how to load and run custom eBPF programs within the kernel of your operating system, modifying the way the kernel behaves. You'll learn what's required to build eBPF-enabled tools, and why eBPF has become so prevalent in such a short period of time. With this report, you will: Learn why the ability to dynamically change the kernel behavior is so useful, and how eBPF is a game-changer when it comes to making kernel changes See what's involved in writing eBPF code with a programming example to understand how the process works Explore an overview of eBPF-enabled tools that you can use to instrument your cloud native applications.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...