Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cgm a22006017i 4500 
003    OCoLC 
005    20240129213017.0 
006    m     o  c         
007    vz czazuu 
007    cr cnannnuuuuu 
008    220607s2022    xx 368        o   vleng d 
020    9781803237114|q(electronic video) 
020    1803237112|q(electronic video) 
029 1  AU@|b000072085971 
035    (OCoLC)1325677484 
037    9781803237114|bO'Reilly Media 
040    ORMDA|beng|erda|epn|cORMDA|dOCLCF|dOCLCO 
049    INap 
082 04 005.3 
082 04 005.3|223/eng/20220607 
099    Streaming Video O’Reilly for Public Libraries 
245 00 Certified Kubernetes security specialist (CKS) course.
       |h[O'Reilly electronic resource] 
250    [First edition]. 
264  1 [Place of publication not identified] :|bPackt Publishing,
       |c[2022] 
300    1 online resource (1 video file (6 hr., 8 min.)) :|bsound,
       color. 
306    060800 
336    two-dimensional moving image|btdi|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
344    digital|2rdatr 
347    video file|2rdaft 
380    Instructional films|2lcgft 
500    "Updated in May 2022." 
511 0  Himanshu Sharma, instructor. 
520    Become a certified Kubernetes security specialist by 
       taking up this complete hands-on course About This Video 
       Deep technical insight into Kubernetes Learn to use 
       kubesec to perform static analysis using Docker image 
       Learn how to use Falco to find malicious processes In 
       Detail This Kubernetes Security Specialist course provides
       foundational knowledge using concepts and hands-on 
       demonstrations of the Kubernetes Cluster. In this course, 
       we will be focusing more on the practical side, so make 
       sure you have a running Kubernetes cluster. This course is
       focused on security. It deals with all aspects of security
       within the context of a Kubernetes environment. That means
       securing not only the Kubernetes cluster itself but also 
       the applications running within the cluster. You will 
       learn how to secure many different components of 
       Kubernetes applications and environments. We are going to 
       cover every topic such as cluster setup, creating an 
       ingress, and securing an ingress. You will also learn 
       cluster hardening, which includes RBAC, role, and role 
       binding for a user. Further, you will learn system 
       hardening, kernel hardening, minimizing microservice 
       vulnerabilities, supply chain security, monitoring, 
       logging, and runtime security. By the end of this 
       Kubernetes course, you will gain in-depth knowledge about 
       Kubernetes and be a Kubernetes security specialist. 
       Audience This Docker course is designed for Kubernetes 
       administrators, security specialists, and for those who 
       want to master Certified Kubernetes Security Specialist. 
       You should already have some Kubernetes Administrator 
       knowledge before attending this course. 
588 0  Online resource; title from title details screen (O'Reilly,
       viewed June 7, 2022). 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Application software|xDevelopment|xComputer programs
       |xCertification|vStudy guides. 
650  0 Computer security|xCertification|vStudy guides. 
655  7 Instructional films|2fast 
655  7 Internet videos|2fast 
655  7 Nonfiction films|2fast 
655  7 Study guides|2fast 
655  7 Instructional films.|2lcgft 
655  7 Nonfiction films.|2lcgft 
655  7 Internet videos.|2lcgft 
655  7 Films de formation.|2rvmgf 
655  7 Films autres que de fiction.|2rvmgf 
655  7 Vidéos sur Internet.|2rvmgf 
700 1  Sharma, Himanshu,|einstructor. 
710 2  Packt Publishing,|epublisher. 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/videos/~/9781803237114/?ar|zAvailable
       for O'Reilly for Public Libraries 
994    92|bJFN