Microservices Security in Action: Design Secure Network and Api Endpoint Security for Microservices Applications, With Examples Using Java, Kubernetes, and Istio
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Microservices Security in Action: Design Secure Network and Api Endpoint Security for Microservices Applications, With Examples Using Java, Kubernetes, and Istio
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Microservices Security in Action: Design Secure Network and Api Endpoint Security for Microservices Applications, With Examples Using Java, Kubernetes, and Istio