- Learn Kubernetes Security
- Kaizhe Huang Pranjal Jumde Loris Degioanni
- 55字
- 2021-06-18 18:32:37
Questions
- When do you start threat modeling your application?
- What are the different threat actors in Kubernetes environments?
- Name one of the most severe threats to the default Kubernetes deployment.
- Why is threat modeling more difficult in a Kubernetes environment?
- How does the attack surface of deployments in Kubernetes compare to deployments in traditional architectures?
推薦閱讀
- 一本書學內部審計:新手內部審計從入門到精通
- 汪博士詳解PMP?模擬題(第4版)
- Pentaho Business Analytics Cookbook
- 審計學
- 審計學基礎
- VMware vCloud Director Essentials
- 中國政府統計問題研究
- Programming Microsoft Dynamics NAV(Fifth Edition)
- Stata統計分析與行業應用案例詳解(第2版)
- QlikView for Developers Cookbook
- INSTANT IBM Lotus Notes 8.5.3 How-to
- Amazon EC2 Cookbook
- 規范內部審計的28個技巧
- PMP 5A備考寶典
- PowerShell Troubleshooting Guide