| LDR | | 05844cmm u22006737 4500 |
| 001 | | 000000340730 |
| 003 | | EBZ |
| 005 | | 20260127112658 |
| 006 | | m d |
| 007 | | cr cnu|||||||| |
| 008 | | 250405s2025 enk o 000 0 eng d |
| 020 | |
▼a 9781805806622
▼q (electronic bk.) |
| 020 | |
▼a 1805806629
▼q (electronic bk.) |
| 020 | |
▼z 9781805806639 |
| 037 | |
▼a 11297107
▼b IEEE |
| 040 | |
▼a EBZ
▼b eng
▼c EBZ
▼d 248032 |
| 049 | |
▼a MAIN |
| 050 | 4 |
▼a QA76.76.A65
▼b P68 2025eb |
| 072 | 7 |
▼a COM
▼x 043000
▼2 bisacsh |
| 072 | 7 |
▼a COM
▼x 046070
▼2 bisacsh |
| 072 | 7 |
▼a COM
▼x 091000
▼2 bisacsh |
| 082 | 04 |
▼a 005.1
▼2 23/eng/20251218 |
| 100 | 1 |
▼a Poulton, Nigel,
▼c (Telecommunications engineer)
▼1 https://id.oclc.org/worldcat/entity/E39PCjK4fYqqhQfKhXQ9kRG3pP |
| 245 | 14 |
▼a The Kubernetes book :
▼b a comprehensive guide to container orchestration and cloud-native deployment /
▼c Nigel Poulton, Pushkar Joglekar. |
| 250 | |
▼a 3rd ed. |
| 260 | |
▼a Birmingham :
▼b Packt Publishing, Limited,
▼c 2025. |
| 300 | |
▼a 1 online resource (341 p.) |
| 336 | |
▼a text
▼b txt
▼2 rdacontent |
| 337 | |
▼a computer
▼b c
▼2 rdamedia |
| 338 | |
▼a online resource
▼b cr
▼2 rdacarrier |
| 341 | 0 |
▼a textual
▼2 sapdv
▼3 EBSCOhost |
| 347 | |
▼a text file
▼b PDF
▼2 rda |
| 500 | |
▼a Description based upon print version of record. |
| 500 | |
▼a Security in the software delivery pipeline |
| 505 | 0 |
▼a Intro -- Table of Contents -- 0: Preface -- Paperbacks, hardbacks, eBooks, audio, and translations -- The sample app and GitHub repo -- Windows users -- Terminology and responsible language -- Feedback -- 1: Kubernetes primer -- Important Kubernetes background -- Kubernetes: the operating system of the cloud -- Chapter summary -- 2: Kubernetes principles of operation -- Kubernetes from 40K feet -- Control plane and worker nodes -- Packaging apps for Kubernetes -- The declarative model and desired state -- Pods -- Deployments -- Service objects and stable networking -- Chapter summary |
| 505 | 8 |
▼a 3: Getting Kubernetes -- Install everything with Docker Desktop -- Build a Linode Kubernetes Engine (LKE) cluster in the Linode Cloud -- Build a Kubernetes cluster in the Linode Cloud -- Configure kubectl -- Test your LKE cluster -- More about kubectl and your kubeconfig file -- Chapter summary -- 4: Working with Pods -- Pod theory -- Multi-container Pods -- Hands-on with Pods -- Clean up -- Chapter Summary -- 5: Virtual clusters with Namespaces -- Intro to Namespaces -- Namespace use cases -- Default Namespaces -- Creating and managing Namespaces -- Deploying objects to Namespaces -- Clean up |
| 505 | 8 |
▼a Chapter Summary -- 6: Kubernetes Deployments -- Deployment theory -- Create a Deployment -- Manually scale the app -- Perform a rolling update -- Perform a rollback -- Clean up -- Chapter summary -- 7: Kubernetes Services -- Service Theory -- Hands-on with Services -- Clean up -- Chapter Summary -- 8: Ingress -- Setting the Scene for Ingress -- Ingress architecture -- Hands-on with Ingress -- Clean up -- Chapter summary -- 9: Wasm on Kubernetes -- Wasm Primer -- Understanding Wasm on Kubernetes -- Hands-on with Wasm on Kubernetes -- Chapter Summary -- 10: Service discovery deep dive |
| 505 | 8 |
▼a Setting the scene -- The service registry -- Service registration -- Service discovery -- Service discovery and Namespaces -- Troubleshooting service discovery -- Clean up -- Chapter summary -- 11: Kubernetes storage -- The big picture -- Storage Providers -- The Container Storage Interface (CSI) -- The Kubernetes persistent volume subsystem -- Dynamic provisioning with Storage Classes -- Hands-on -- Clean up -- Chapter Summary -- 12: ConfigMaps and Secrets -- The big picture -- ConfigMap theory -- Hands-on with ConfigMaps -- Hands-on with Secrets -- Clean up -- Chapter Summary |
| 505 | 8 |
▼a 13: StatefulSets -- StatefulSet theory -- Hands-on with StatefulSets -- Clean up -- Chapter Summary -- 14: API security and RBAC -- API security big picture -- Authentication -- Authorization (RBAC) -- Admission control -- Chapter summary -- 15: The Kubernetes API -- Kubernetes API big picture -- The API server -- The API -- Chapter summary -- 16: Threat modeling Kubernetes -- Threat modeling -- Spoofing -- Tampering -- Repudiation -- Information Disclosure -- Denial of Service -- Elevation of privilege -- Chapter summary -- 17: Real-world Kubernetes security |
| 532 | 8 |
▼a The accessibility of this resources in unknown or unassessed. |
| 532 | 0 |
▼3 EBSCOhost
▼a "EBSCO evaluates our products based on the Web Content Accessibility Guidelines (WCAG) and the related Section 508 and EN 301 549 regulations in the US and EU. Most EBSCO products are substantially conformant with WCAG 2.2 level AA." Source: https://connect.ebsco.com/s/article/EBSCO-VPATs?language=en_US. Last accessed April 22, 2025. |
| 546 | |
▼a In English. |
| 590 | |
▼a OCLC control number change - WorldCat record variable field(s) change: 050, 082, 650 |
| 650 | 0 |
▼a Application software
▼x Development
▼x Automation. |
| 650 | 0 |
▼a Open source software. |
| 650 | 0 |
▼a Cloud computing. |
| 650 | 0 |
▼a Application program interfaces (Computer software) |
| 650 | 7 |
▼a COMPUTERS / Networking / General.
▼2 bisacsh |
| 650 | 7 |
▼a COMPUTERS / Operating Systems / Linux.
▼2 bisacsh |
| 650 | 7 |
▼a COMPUTERS / Cloud Computing .
▼2 bisacsh |
| 655 | 0 |
▼a Electronic books. |
| 700 | 1 |
▼a Joglekar, Pushkar. |
| 776 | 08 |
▼i Print version:
▼a Poulton, Nigel
▼t The Kubernetes Book
▼d Birmingham : Packt Publishing, Limited,c2025 |
| 856 | 40 |
▼3 EBSCOhost
▼u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=4167044 |
| 936 | |
▼a BATCHLOAD |
| 938 | |
▼a EBSCOhost
▼b EBSC
▼n 4167044 |
| 938 | |
▼a Kortext
▼b KTXT
▼n 3357428 |
| 938 | |
▼a De Gruyter
▼b DEGR
▼n 9781805806622 |
| 938 | |
▼b OCKB
▼z igpublish.packtpublishing,ad9636e4-c6fe-4b7d-8389-d6fffde2c257-emi |
| 990 | |
▼a 관리자 |