MARC보기
LDR05844cmm u22006737 4500
001000000340730
003EBZ
00520260127112658
006m d
007cr cnu||||||||
008250405s2025 enk o 000 0 eng d
020 ▼a 9781805806622 ▼q (electronic bk.)
020 ▼a 1805806629 ▼q (electronic bk.)
020 ▼z 9781805806639
037 ▼a 11297107 ▼b IEEE
040 ▼a EBZ ▼b eng ▼c EBZ ▼d 248032
049 ▼a MAIN
050 4 ▼a QA76.76.A65 ▼b P68 2025eb
072 7 ▼a COM ▼x 043000 ▼2 bisacsh
072 7 ▼a COM ▼x 046070 ▼2 bisacsh
072 7 ▼a COM ▼x 091000 ▼2 bisacsh
08204 ▼a 005.1 ▼2 23/eng/20251218
1001 ▼a Poulton, Nigel, ▼c (Telecommunications engineer) ▼1 https://id.oclc.org/worldcat/entity/E39PCjK4fYqqhQfKhXQ9kRG3pP
24514 ▼a The Kubernetes book : ▼b a comprehensive guide to container orchestration and cloud-native deployment / ▼c Nigel Poulton, Pushkar Joglekar.
250 ▼a 3rd ed.
260 ▼a Birmingham : ▼b Packt Publishing, Limited, ▼c 2025.
300 ▼a 1 online resource (341 p.)
336 ▼a text ▼b txt ▼2 rdacontent
337 ▼a computer ▼b c ▼2 rdamedia
338 ▼a online resource ▼b cr ▼2 rdacarrier
3410 ▼a textual ▼2 sapdv ▼3 EBSCOhost
347 ▼a text file ▼b PDF ▼2 rda
500 ▼a Description based upon print version of record.
500 ▼a Security in the software delivery pipeline
5050 ▼a Intro -- Table of Contents -- 0: Preface -- Paperbacks, hardbacks, eBooks, audio, and translations -- The sample app and GitHub repo -- Windows users -- Terminology and responsible language -- Feedback -- 1: Kubernetes primer -- Important Kubernetes background -- Kubernetes: the operating system of the cloud -- Chapter summary -- 2: Kubernetes principles of operation -- Kubernetes from 40K feet -- Control plane and worker nodes -- Packaging apps for Kubernetes -- The declarative model and desired state -- Pods -- Deployments -- Service objects and stable networking -- Chapter summary
5058 ▼a 3: Getting Kubernetes -- Install everything with Docker Desktop -- Build a Linode Kubernetes Engine (LKE) cluster in the Linode Cloud -- Build a Kubernetes cluster in the Linode Cloud -- Configure kubectl -- Test your LKE cluster -- More about kubectl and your kubeconfig file -- Chapter summary -- 4: Working with Pods -- Pod theory -- Multi-container Pods -- Hands-on with Pods -- Clean up -- Chapter Summary -- 5: Virtual clusters with Namespaces -- Intro to Namespaces -- Namespace use cases -- Default Namespaces -- Creating and managing Namespaces -- Deploying objects to Namespaces -- Clean up
5058 ▼a Chapter Summary -- 6: Kubernetes Deployments -- Deployment theory -- Create a Deployment -- Manually scale the app -- Perform a rolling update -- Perform a rollback -- Clean up -- Chapter summary -- 7: Kubernetes Services -- Service Theory -- Hands-on with Services -- Clean up -- Chapter Summary -- 8: Ingress -- Setting the Scene for Ingress -- Ingress architecture -- Hands-on with Ingress -- Clean up -- Chapter summary -- 9: Wasm on Kubernetes -- Wasm Primer -- Understanding Wasm on Kubernetes -- Hands-on with Wasm on Kubernetes -- Chapter Summary -- 10: Service discovery deep dive
5058 ▼a Setting the scene -- The service registry -- Service registration -- Service discovery -- Service discovery and Namespaces -- Troubleshooting service discovery -- Clean up -- Chapter summary -- 11: Kubernetes storage -- The big picture -- Storage Providers -- The Container Storage Interface (CSI) -- The Kubernetes persistent volume subsystem -- Dynamic provisioning with Storage Classes -- Hands-on -- Clean up -- Chapter Summary -- 12: ConfigMaps and Secrets -- The big picture -- ConfigMap theory -- Hands-on with ConfigMaps -- Hands-on with Secrets -- Clean up -- Chapter Summary
5058 ▼a 13: StatefulSets -- StatefulSet theory -- Hands-on with StatefulSets -- Clean up -- Chapter Summary -- 14: API security and RBAC -- API security big picture -- Authentication -- Authorization (RBAC) -- Admission control -- Chapter summary -- 15: The Kubernetes API -- Kubernetes API big picture -- The API server -- The API -- Chapter summary -- 16: Threat modeling Kubernetes -- Threat modeling -- Spoofing -- Tampering -- Repudiation -- Information Disclosure -- Denial of Service -- Elevation of privilege -- Chapter summary -- 17: Real-world Kubernetes security
5328 ▼a The accessibility of this resources in unknown or unassessed.
532 0 ▼3 EBSCOhost ▼a "EBSCO evaluates our products based on the Web Content Accessibility Guidelines (WCAG) and the related Section 508 and EN 301 549 regulations in the US and EU. Most EBSCO products are substantially conformant with WCAG 2.2 level AA." Source: https://connect.ebsco.com/s/article/EBSCO-VPATs?language=en_US. Last accessed April 22, 2025.
546 ▼a In English.
590 ▼a OCLC control number change - WorldCat record variable field(s) change: 050, 082, 650
650 0 ▼a Application software ▼x Development ▼x Automation.
650 0 ▼a Open source software.
650 0 ▼a Cloud computing.
650 0 ▼a Application program interfaces (Computer software)
650 7 ▼a COMPUTERS / Networking / General. ▼2 bisacsh
650 7 ▼a COMPUTERS / Operating Systems / Linux. ▼2 bisacsh
650 7 ▼a COMPUTERS / Cloud Computing . ▼2 bisacsh
655 0 ▼a Electronic books.
7001 ▼a Joglekar, Pushkar.
77608 ▼i Print version: ▼a Poulton, Nigel ▼t The Kubernetes Book ▼d Birmingham : Packt Publishing, Limited,c2025
85640 ▼3 EBSCOhost ▼u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=4167044
936 ▼a BATCHLOAD
938 ▼a EBSCOhost ▼b EBSC ▼n 4167044
938 ▼a Kortext ▼b KTXT ▼n 3357428
938 ▼a De Gruyter ▼b DEGR ▼n 9781805806622
938 ▼b OCKB ▼z igpublish.packtpublishing,ad9636e4-c6fe-4b7d-8389-d6fffde2c257-emi
990 ▼a 관리자