logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Serverless Security Guy Podjarny Liran Tal

  • SKU: BELL-51141780
Serverless Security Guy Podjarny Liran Tal
$ 31.00 $ 45.00 (-31%)

0.0

0 reviews

Serverless Security Guy Podjarny Liran Tal instant download after payment.

Publisher: O'Reilly Media, Inc.
File Extension: PDF
File size: 2.37 MB
Pages: 63
Author: Guy Podjarny; Liran Tal
ISBN: 9781492082538, 1492082538
Language: English
Year: 2019

Product desciption

Serverless Security Guy Podjarny Liran Tal by Guy Podjarny; Liran Tal 9781492082538, 1492082538 instant download after payment.

Serverless is taking the cloud native world by storm. This new approach promises extraordinary value, from increased developer productivity to dramatic cost savings. In some aspects, serverless also boasts significant security advantages compared to the server model. But as this practical report explains, securing serverless still requires diligence from the developers and application security professionals involved in the process.

Guy Podjarny and Liran Tal from Snyk examine the significant benefits that serverless brings to application security, as well as the considerable risks involved when you configure a serverless system. You’ll also learn a platform-agnostic security model known as CLAD that will help you address Code vulnerabilities, Library vulnerabilities, Access and permissions, and Data security.

This report helps you:

Understand what serverless is and how this model evolved from cloud native processes
Explore the three primary areas where serverless improves security
Learn how the CLAD model provides four categories to help you home in on specific security issues
Follow a detailed example that demonstrates how poor security manifests in real-world serverless applications

Related Products