skip to content
Securing microservices : protect sensitive data in transit and at rest Preview this item
ClosePreview this item
Checking...

Securing microservices : protect sensitive data in transit and at rest

Author: Sam Newman
Publisher: [Place of publication not identified] : O'Reilly Media, [2018] ©2018
Edition/Format:   eVideo : Clipart/images/graphics : EnglishView all editions and formats
Summary:
"Microservice architectures offer a lot of advantages: making it easier to scale your application and team, use different technology, and ship features more quickly. However, they also create serious challenges, such as how to properly ensure that the systems you create are secure. If done well, microservice architectures can be significantly more secure than other types of software, but if approached in a naive  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Clipart/images/graphics, Internet resource, Videorecording
Document Type: Internet Resource, Computer File, Visual material
All Authors / Contributors: Sam Newman
OCLC Number: 1031484880
Notes: Title from title screen (viewed April 17, 2018).
Performer(s): Presenter, Sam Newman.
Description: 1 online resource (1 streaming video file (2 hr., 35 min., 58 sec.)) : digital, sound, color
Other Titles: Protect sensitive data in transit and at rest
Responsibility: with Sam Newman.

Abstract:

"Microservice architectures offer a lot of advantages: making it easier to scale your application and team, use different technology, and ship features more quickly. However, they also create serious challenges, such as how to properly ensure that the systems you create are secure. If done well, microservice architectures can be significantly more secure than other types of software, but if approached in a naive fashion, you can end up with a less secure, more compromised system. This video provides the sophisticated knowledge you need to create secure architectures from the ground up. The course works best for participants who understand what microservices are and who have some experience working with distributed systems."--Resource description page.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1031484880> # Securing microservices : protect sensitive data in transit and at rest
    a schema:Movie, schema:VideoObject, schema:CreativeWork ;
    library:oclcnum "1031484880" ;
    rdfs:comment "Unknown 'gen' value: cig" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4975367732#Topic/business_data_processing_security_measures> ; # Business--Data processing--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/4975367732#Topic/application_software_development> ; # Application software--Development
    schema:about <http://experiment.worldcat.org/entity/work/data/4975367732#Topic/software_architecture> ; # Software architecture
    schema:about <http://experiment.worldcat.org/entity/work/data/4975367732#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:alternateName "Protect sensitive data in transit and at rest" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/4975367732#Person/newman_sam> ; # Sam Newman
    schema:datePublished "2018" ;
    schema:description ""Microservice architectures offer a lot of advantages: making it easier to scale your application and team, use different technology, and ship features more quickly. However, they also create serious challenges, such as how to properly ensure that the systems you create are secure. If done well, microservice architectures can be significantly more secure than other types of software, but if approached in a naive fashion, you can end up with a less secure, more compromised system. This video provides the sophisticated knowledge you need to create secure architectures from the ground up. The course works best for participants who understand what microservices are and who have some experience working with distributed systems."--Resource description page."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4975367732> ;
    schema:inLanguage "en" ;
    schema:name "Securing microservices : protect sensitive data in transit and at rest"@en ;
    schema:productID "1031484880" ;
    schema:url <https://login.library.sheridanc.on.ca/login?url=http://proquestcombo.safaribooksonline.com/?uiCode=sheridan&xmlId=9781492038986> ;
    schema:url <http://ezproxy.torontopubliclibrary.ca/login?url=http://proquestcombo.safaribooksonline.com/?uiCode=torontopl&xmlId=9781492038986> ;
    schema:url <http://proquest.safaribooksonline.com/?fpi=9781492038986> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1031484880> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4975367732#Person/newman_sam> # Sam Newman
    a schema:Person ;
    schema:familyName "Newman" ;
    schema:givenName "Sam" ;
    schema:name "Sam Newman" ;
    .

<http://experiment.worldcat.org/entity/work/data/4975367732#Topic/application_software_development> # Application software--Development
    a schema:Intangible ;
    schema:name "Application software--Development"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4975367732#Topic/business_data_processing_security_measures> # Business--Data processing--Security measures
    a schema:Intangible ;
    schema:name "Business--Data processing--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4975367732#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4975367732#Topic/software_architecture> # Software architecture
    a schema:Intangible ;
    schema:name "Software architecture"@en ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.