O'Reilly Media Container Security: Fundamental Technology Concepts that Protect Containerized Applications
M**N
Container Security Distilled
Don't hesitate to purchase this book if you want to quickly learn how to secure container containers. Liz does a great job of explaining relevant security concepts well without belaboring them and she provides enough detail at sufficient depth to provide you with a level of understanding that you may not get from the material you curate yourself. In a nutshell, she arms you with the information you need to have well informed, risk-based discussions with your platform and software engineers about how to optimally secure containerized services. The book is and will remain relevant for quite some time.
M**A
Um dos melhores livros que já li.
As melhores parte são as explicações sobre os Namespaces para Container Isolation e Container Network Security, já li ele 2 vezes e pretendo ser alguns capítulos novamente... Parabéns há todos os envolvidos nesta bela obra.
S**.
A solid introduction to container security
Summary: Overall I found the book informative and well structured. It helped me clear some concepts around containers, their interaction with the operating system and their security.This book is a broad inspection of many technologies that can help you secure your containers throughout their lifecycle. Although the author does not go into many details for each and every technology covered, she puts emphasis on the ones that are important (e.g. she explains the linux kernel namespaces, cgroups and capabilities which are essential to understand how containers work).Also, a big plus for me is that the book has the proper page count: it's not too brief (you get a lot of info) and not too lengthy (so that you lose yourself in non-essential text).I recommend the book to everyone that is already working with containers; for the people that are not already familiar with them, it may seem a bit advanced (this is also stated in the "Who this book is for" section of the book).
L**Y
Good coverage of lots of security angles.
I've followed Liz on twitter for a number of years as part of trying to keep on top of security and best practices, so when I saw this come out I added it to my wish list. At work we are starting to make use of EKS so now felt like a good time to get up to speed on security before we get too far down a road we can't get out of !Lots of topics in here, all well explained with examples, some threats I already knew about, but a number of vectors that I had not considered before, including diving deep into how containers actually run on a cluster.Anyone working with containers ought to buy and read this.
L**R
Good book
The author explains in a "quick way" certain topics to keep the book short and I appreciate that as the book is not a Linux manual. She provides some practical advises, which is what is really important with this type of books.In certain areas (especially in the introductory chapters) she could have explained things a bit better, but in general it is a very compact and to the point book. I recommend it.
Trustpilot
Hace 1 mes
Hace 2 meses