Need help? Contact library@nbcc.ca
Hacking Kubernetes
by
Running cloud native workloads on Kubernetes can be challenging: keeping them secure is even more so. Kubernetes' complexity offers malicious in-house users and external attackers alike a large assortment of attack vectors. Hacking Kubernetes reviews defaults and threat models and shows how to protect against attacks.
Search using subject keywords, title of book or author's name.



