Modeling and Simulation

Modeling and Simulation

Linking Entertainment and Defense

  • Editor: National Academies Press
  • ISBN: 9780309058421
  • eISBN Pdf: 9780309370189
  • Lugar de publicación:  España
  • Año de publicación digital: 2025
  • Mes: Febrero
  • Idioma: Ingles
Unlock the Power of Cilium and eBPF to Revolutionize Cloud-Native Security and Networking

Key Features
● Master eBPF concepts and their real-world applications in cloud computing
● Explore Cilium’s capabilities with hands-on examples and Kubernetes integration
● Implement Zero Trust Security models with eBPF for microservices
● Optimize network performance and observability using eBPF and Hubble

Book Description
Cilium and eBPF are revolutionizing cloud-native development by providing unparalleled observability, security, and performance enhancements. Ultimate Cilium and eBPF for Cloud Native Development bridges the knowledge gap, empowering developers, DevOps engineers, and IT professionals to leverage these technologies for building robust, scalable cloud-native
applications.

This book explores eBPF and Cilium in depth, starting with core concepts and fundamental principles to establish a solid foundation. Subsequent chapters cover practical applications, including tutorials on implementing Cilium in Kubernetes, optimizing network performance, and enhancing security with eBPF. Key takeaways include mastering eBPF programming, deploying Cilium for networking, monitoring applications, and leveraging eBPF for advanced security. Real-world case studies and hands-on examples provide practical insights and reinforce learning.

By the end of this book, you will be equipped to implement and manage eBPF and Cilium in cloud-native projects. You will gain the skills to optimize performance, ensure robust security, and achieve superior observability, positioning yourself at the forefront of cloud-native development.

What you will learn
● Develop a strong grasp of eBPF and Cilium’s core concepts and applications.
● Optimize eBPF and Cilium for Kubernetes observability, security, and performance.
● Gain hands-on experience through real-world cloud-native development tutorials.
● Master troubleshooting tools for network performance and policy enforcement.
● Utilize eBPF-driven observability to secure and scale microservices.
● Apply advanced technologies to modernize workflows and cloud environments.
  • The role of artificial intelligence and distributed computing in IOT applications
  • Half-title
  • Title Page
  • Staff
  • Index
  • Spectra Routing
    • 1 Introduction
    • 2 Design Goal
    • 3 Project Technologies
      • 3.1 Open Street MAP
      • 3.2 OpenRouteService
      • 3.3 Leaflet
      • 3.4 Nominatim
      • 3.5 Pelias
      • 3.6 Cassandra
    • 4 High-Level Design
    • 5 Platform Overview
    • Referencias
  • Design of platforms based on blockchain technology applied to different use cases
    • 1 Introduction
    • 2 Blockchain Technology: background
    • 3 Solutions Review
    • 4 Current Works
    • 5 Conclusions
    • Acknowledgments
    • References
  • A deep tech architecture for intelligent IoT systems
    • 1 Introducción
    • 2 Edge Computing & Fog Computing
    • 3 Deep Tech
    • 4 Distributed Artificial Inteligence
    • 5 Conclusion
    • 6 Future work
    • References
  • The importance of digital transformation. Incidence of The Digital Economy and Society Index (DESI)
    • 1 Introduction
      • 1.1 Digital transformation. A global concept
      • 1.2 The Digital Economy and Society Index (DESI)
    • 2 Methodology
      • 2.1 Population and sample
      • 2.2 Variables
      • 2.3 Estimation techniques
    • 3 Results
    • 4 Conclusions
    • Acknowledgement
    • References
  • Distribution of quantum keys over commercial networks
    • 1 Introducción
    • 2 Quantum communication protocol
      • 2.1 BB84
      • 2.2 Practical example of protocol use BB84
    • 3 Quantum Key Distribution
      • 3.1 Basic Network of Municipalities
      • 3.2 Identification of Representative Municipalities
      • 3.3 Repeater Network
    • 4 Experimentation
    • 5 Conclusion
    • References
  • GECA: A Global Edge Computing Architecture
    • 1 Introduction
    • 2 A Global Edge Computing Architecture
    • 3 Conclusion
    • References
  • Windy Rural Collaborative Postmen Problem using ROS as Multi-Agent System Architecture
    • 1 Introduction
    • 2 Proposal
    • References
  • Design and development of solutions for research projects: Upper, CityChain and pulse generator
    • 1 Introduction
      • 1.1 Problem description
      • 1.2 Reasons
      • 1.3 Brief description of solution
    • 2 Materials and methods
    • 3 Conclusions
    • References
  • A Recommendation-based Proposal for Improving Energy Efficiency in Housing
    • 1 Introduction
    • 2 Objectives and Methodology
      • 2.1 Contribution
    • 3 Results Analysis
    • 4 Conclusion
    • References
  • Recommender systems based on hybrid models
    • 1 Introduction
    • 2 Job offer recommender system
    • 3 Resources recommender system based on the students performance
    • References
    • Contracubierta

SUBSCRIBE TO OUR NEWSLETTER

By subscribing, you accept our Privacy Policy