Securing Docker by Gallagher Scott
Author:Gallagher, Scott [Gallagher, Scott]
Language: eng
Format: azw3, epub
Publisher: Packt Publishing
Published: 2016-03-30T04:00:00+00:00
Container images/runtime
This part of the guide contains both the information for securing the container images as well as the container runtime.
The first part contains images, cover base images, and build files that were used. You need to be sure about the images you are using not only for your base images, but also for any aspect of your Docker experience. This section of the guide covers the items you should follow while creating your own base images to ensure they are secure.
The second part, the container runtime, covers a lot of security-related items. You have to take care of the runtime variables that you are providing. In some cases, attackers can use them to their advantage, while you think you are using them to your own advantage. Exposing too much in your container can compromise the security of not only that container, but also the Docker host and other containers running on this host.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7769)
Filmora Efficient Editing by Alexander Zacharias(5806)
The Infinite Retina by Robert Scoble Irena Cronin(5285)
Learn Wireshark - Fundamentals of Wireshark. by Lisa Bock(3988)
Linux Device Driver Development Cookbook by Rodolfo Giometti(3935)
Edit Like a Pro with iMovie by Regit(3439)
Linux Administration Best Practices by Scott Alan Miller(2858)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic & Jasmin Redzepagic(2837)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2522)
Mastering PowerShell Scripting - Fourth Edition by Chris Dent(2410)
Docker on Windows by Stoneman Elton(2319)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2315)
Creative Projects for Rust Programmers by Carlo Milanesi(2262)
Hands-On AWS Penetration Testing with Kali Linux by Karl Gilbert(2110)
Hands-On Linux for Architects by Denis Salamanca(2053)
Programming in C (4th Edition) (Developer's Library) by Stephen G. Kochan(2006)
Computers For Seniors For Dummies by Nancy C. Muir(2003)
The Old New Thing by Raymond Chen(1941)
Linux Kernel Debugging by Kaiwan N Billimoria(1763)
