Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.
Please read the tutorial at this link: https://ebookbell.com/faq
We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.
For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.
EbookBell Team
4.0
96 reviewsCloud applications have special security requirements and concerns. This book demonstrates effective real-world practices to keep your cloud and Kubernetes-deployed applications safe and sound.
In Securing Cloud Applications you will learn how to
• Configure industry standard security protocols correctly
• Quickly debug errors and exceptions form security libraries
• Utilize the developer-friendly Google Tink cryptography library
• Work with X.509 digital certificates for implementing application security
• Setup passwordless logins using the WebAuthentication protocol
• Implement single sign on using OpenID Connect protocol
• Establish authentication and authorization services using the Spring Authorization Server
• Make use of popular secret storage solutions including HashiCorp Vault, AWS KMS, Google KMS, and Azure Key Vault
• Use the security features of Kubernetes to secure deployed applications
• Securely containerize application code
Securing Cloud Applications is a hands-on guide for working developers. It minimizes the abstract and complex security theory, instead focusing on the practices you need to secure applications running on Kubernetes and the cloud. In it, you’ll learn how to take advantage of pre-built security services in your daily development. Author Adib Saikali takes a developer-to-developer approach, sharing hard-won lessons from many years securing software in real-world environments. Easy-to-follow sample applications written in Java take you hands-on with security standards and protocols, turning complex concepts into practical solutions.
about the technology
Despite its absolute importance, security practices can appear to be confusing, complex, and mysterious. This book breaks down the fundamentals of securing cloud-based applications in a way that’s both practical and easy to understand. The goal is simple: you’ll learn the concepts and practices you’ll need to keep your cloud applications and data safe during development and after deployment.