Container Security: Fundamental Technology Concepts that Protect Containerized Applications
Container Security: Fundamental Technology Concepts that Protect Containerized Applications
YOU SAVE £13.95
- Condition: Brand new
- UK Delivery times: Usually arrives within 2 - 3 working days
- UK Shipping: Fee starts at £2.39. Subject to product weight & dimension
- More about Container Security: Fundamental Technology Concepts that Protect Containerized Applications
This book provides practical guidance for assessing security risks and determining appropriate solutions in cloud native environments using containers and orchestration. It examines key underlying technologies, attack vectors, and measures for hardening containers, and offers best practices for building secure container images.
Format: Paperback / softback
Length: 165 pages
Publication date: 17 April 2020
Publisher: O'Reilly Media, Inc, USA
Many organizations now run applications in cloud-native environments using containers and orchestration to facilitate scalability and resilience. However, it is crucial to ensure the deployment is secure. This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine appropriate solutions.
Author Liz Rice, VP of open source engineering at Aqua Security, delves into how the building blocks commonly used in container-based systems are constructed in Linux. By understanding these constructs, developers, operators, and security professionals can gain a deeper understanding of what happens when deploying containers and identify potential security risks that could affect their deployments.
Whether you are running container applications with kubectl or docker and using Linux command-line tools such as ps and grep, this book is designed to get you started. It explores attack vectors that affect container deployments, dives into the Linux constructs that underpin containers, examines measures for hardening containers, understands how misconfigurations can compromise container isolation, and provides best practices for building container images.
Furthermore, the book identifies container images that have known software vulnerabilities and leverages secure connections between containers. It also uses security tooling to prevent attacks on your deployment. By following the guidance provided in this book, organizations can ensure their container deployments are secure and resilient, protecting their applications and data from potential threats.
Weight: 354g
Dimension: 177 x 233 x 14 (mm)
ISBN-13: 9781492056706
This item can be found in:
UK and International shipping information
UK and International shipping information
UK Delivery and returns information:
- Delivery within 2 - 3 days when ordering in the UK.
- Shipping fee for UK customers from £2.39. Fully tracked shipping service available.
- Returns policy: Return within 30 days of receipt for full refund.
International deliveries:
Shulph Ink now ships to Australia, Belgium, Canada, France, Germany, Ireland, Italy, India, Luxembourg Saudi Arabia, Singapore, Spain, Netherlands, New Zealand, United Arab Emirates, United States of America.
- Delivery times: within 5 - 10 days for international orders.
- Shipping fee: charges vary for overseas orders. Only tracked services are available for most international orders. Some countries have untracked shipping options.
- Customs charges: If ordering to addresses outside the United Kingdom, you may or may not incur additional customs and duties fees during local delivery.