{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BC1018842X.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BC1018842X#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BC1018842X.json"},"dc:title":[{"@value":"Hacking Kubernetes : threat-driven analysis and defense"}],"dc:creator":"Andrew Martin, Michael Hausenblas","dc:publisher":[{"@value":"O'Reilly Media"}],"dcterms:extent":"xiv, 295 p.","cinii:size":"24 cm","dc:language":"eng","dc:date":"2021","cinii:ncid":"BC1018842X","cinii:ownerCount":"1","foaf:maker":[{"@type":"foaf:Person","foaf:name":[{"@value":"Martin, Andrew"}]},{"@id":"https://ci.nii.ac.jp/author/DB00283183#entity","@type":"foaf:Person","foaf:name":[{"@value":"Hausenblas, Michael"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA011791","@type":"foaf:Organization","foaf:name":"東京大学 工学部・工学系研究科","rdfs:seeAlso":{"@id":"https://opac.dl.itc.u-tokyo.ac.jp/opac/opac_openurl/?ncid=BC1018842X"}}],"prism:publicationDate":["2021, c2022"],"dc:subject":["DC23:005.3"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Open+source+software+--+Security+measures","dc:title":"Open source software -- Security measures"},{"@id":"https://ci.nii.ac.jp/books/search?q=Application+software+--+Security+measures","dc:title":"Application software -- Security measures"}],"dcterms:hasPart":[{"@id":"urn:isbn:9781492081739"}]}]}