<p>This book belongs to the <b>Port Economics and Global Supply Chain Management</b> strand of the <i>Palgrave Studies in Maritime Economics</i> book series, commissioned by Hercules Haralambides.<br>This book addresses the security of the global system of maritime-based trade, with a focus on conta
Container Security
β Scribed by Liz Rice
- Publisher
- O'Reilly Media, Inc.
- Year
- 2020
- Tongue
- English
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Many organizations now run applications in cloud native environments, using containers and orchestration to facilitate scalability and resilience. But how do you know whether your deployment is secure? To fully grasp the security implications of containers and their operation, youβll need an understanding of what they are and how they work. In this excerpt from her forthcoming book Container Security, author Liz Rice takes you through the mechanisms that isolate and protect your applications within each container.
This book as a whole looks at the building blocks and security boundaries commonly used in container-based systems and how theyβre constructed in the Linux operating system. In the featured chapter, "Container Isolation," youβll learn how namespaces limit the set of files and directories that particular container processes can see, functionally isolating them from other operations.
Learn how a container is actually a Linux process with a restricted view of the machine itβs running on
Explore the different namespaces typically used to create Linux containers
Examine how containerized processes are isolated from the host and other containerized processes
π SIMILAR VOLUMES
<p>Spiezio advances a novel argument about the difficulties the major powers of Europe are likely to encounter in attempting the multilateral management of regional security problems.</p>
The Standard Club, Charles Taylor & Co Limited, London, 2012. 46 p.<div class="bb-sep"></div>The Standard Club series - A Master's Guide to Container Securing. The Standard P&I Clubβs loss prevention programme focuses on best practice to avert those claims that are avoidable and that often result fr
<p>In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided.</p>