Cloud Native Data Security with Oauth: A Scalable Zero Trust Architecture
暫譯: 雲原生數據安全與 OAuth:可擴展的零信任架構
Archer, Gary, Kahrer, Judith, Trojanowski, Michal
買這商品的人也買了...
-
$2,280Working Effectively with Legacy Code (Paperback)
-
$1,700$1,700 -
$1,640$1,558 -
$4,620$4,389 -
$1,980$1,881 -
$600$474 -
$1,568$1,485 -
$560$442 -
$1,998$1,898 -
$1,881$1,782 -
$650$553 -
$680$578 -
$2,328$2,205 -
$2,070Multithreaded JavaScript: Concurrency Beyond the Event Loop
-
$2,338Software Architecture: The Hard Parts: Modern Trade-Off Analyses for Distributed Architectures (Paperback)
-
$2,680$2,546 -
$580$458 -
$2,052Mastering API Architecture: Design, Operate, and Evolve Api-Based Systems (Paperback)
-
$600$450 -
$2,233Functional and Concurrent Programming: Core Concepts and Features
-
$1,881Functional Design: Principles, Patterns, and Practices (Paperback)
-
$750$562 -
$2,043$1,935 -
$1,663$1,575 -
$1,890Mastering Opentelemetry and Observability: Enhancing Application and Infrastructure Performance and Avoiding Outages
相關主題
商品描述
With the growth of cloud native applications, developers increasingly rely on APIs to make everything work. But security often lags behind, making APIs an attractive target for bad actors looking to access valuable business data. OAuth, a powerful framework for API security, offers tools to protect sensitive business data and enforce dynamic access controls. But to harness its full potential, you need more than standards--you need strategies for adapting to evolving security demands.
Designed for developers, architects, and security professionals, this guide provides everything you need to secure APIs in the cloud native era--ensuring your business data stays protected. You'll learn how to combine OAuth's token-based model with cloud native platforms like Kubernetes to build a scalable, zero trust security architecture. With OAuth, you can go beyond simple allow/deny rules and create security policies that align with business needs, while Kubernetes provides best-in-class deployment patterns to keep systems secure and efficient.
- Understand why user identity must be part of your cloud native security stack
- Discover how to integrate user identity into APIs
- Learn to externalize security and secure data access using OAuth
- Uncover methods for running security components in a Kubernetes cluster
- Get the latest security best practices for client applications and APIs