Cargando…

Securing Docker : learn how to secure your Docker environment and keep your environments secure irrespective of the threats out there /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Gallagher, Scott (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2016.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 EBSCO_ocn946526866
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 160412s2016 enka o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d N$T  |d YDXCP  |d IDEBK  |d KSU  |d DEBSZ  |d DEBBG  |d C6I  |d OCLCQ  |d TEFOD  |d OCLCF  |d CEF  |d UKMGB  |d AGLDB  |d IGB  |d RDF  |d INARC  |d OCLCO  |d OCLCQ 
015 |a GBB6G3489  |2 bnb 
016 7 |a 018010594  |2 Uk 
019 |a 946006624  |a 946106460 
020 |a 9781785881961  |q (electronic bk.) 
020 |a 1785881965  |q (electronic bk.) 
020 |z 1785888854 
020 |z 9781785888854 
029 1 |a DEBSZ  |b 480366764 
029 1 |a DEBBG  |b BV043969194 
029 1 |a DEBSZ  |b 485797089 
029 1 |a GBVCP  |b 882849379 
029 1 |a AU@  |b 000058967209 
029 1 |a UKMGB  |b 018010594 
029 1 |a AU@  |b 000067092236 
035 |a (OCoLC)946526866  |z (OCoLC)946006624  |z (OCoLC)946106460 
037 |a CL0500000732  |b Safari Books Online 
037 |a 0A492ABB-B1E2-4D13-8555-E390D73B03AE  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.76.A5 
072 7 |a COM  |x 000000  |2 bisacsh 
082 0 4 |a 005.3  |2 23 
049 |a UAMI 
100 1 |a Gallagher, Scott,  |e author. 
245 1 0 |a Securing Docker :  |b learn how to secure your Docker environment and keep your environments secure irrespective of the threats out there /  |c Scott Gallagher. 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2016. 
300 |a 1 online resource :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Community experience distilled 
588 |a Description based on online resource; title from cover (viewed April 12, 2016). 
500 |a Includes index. 
520 8 |a Annotation  |b Learn how to secure your Docker environment and keep your environments secure irrespective of the threats out thereAbout This Book Gain confidence in using Docker for containerization without compromising on security This book covers different techniques to help you develop your container security skills It is loaded with practical examples and real-world scenarios to secure your container-based applicationsWho This Book Is ForThis book is for developers who wish to use Docker as their testing platform as well as security professionals who are interested in securing Docker containers. You must be familiar with the basics of Docker.What You Will Learn Find out how to secure your Docker hosts and nodes Secure your Docker components Explore different security measures/methods for Linux kernels Install and run the Docker Bench security application Monitor and report security issues Familiarize yourself with third-party tools such as Traffic Authorization, Summon, sVirt, and SELinux to secure your Docker environmentIn DetailWith the rising integration and adoption of Docker containers, there is a growing need to ensure their security.The purpose of this book is to provide techniques and enhance your skills to secure Docker containers easily and efficiently. The book starts by sharing the techniques to configure Docker components securely and explore the different security measures/methods one can use to secure the kernel.Furthermore, we will cover the best practices to report Docker security findings and will show you how you can safely report any security findings you come across. Toward the end, we list the internal and third-party tools that can help you immunize your Docker environment.By the end of this book, you will have a complete understanding of Docker security so you are able to protect your container-based applications.Style and approachThis book is your one-stop solution to resolve all your Docker security concerns. It will familiarize you with techniques to safeguard your applications that run on Docker containers. 
505 0 |a Cover ; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Securing Docker Hosts; Docker host overview; Discussing Docker host; Virtualization and isolation; Attack surface of Docker daemon; Protecting the Docker daemon; Securing Docker hosts; Docker Machine; SELinux and AppArmor; Auto-patching hosts; Summary; Chapter 2 : Securing Docker Components; Docker Content Trust; Docker Content Trust components; Signing images; Hardware signing; Docker Subscription; Docker Trusted Registry; Installation; Securing Docker Trusted Registry 
505 8 |a AdministeringWorkflow; Docker Registry; Installation; Configuration and security; Summary; Chapter 3 : Securing and Hardening Linux Kernels; Linux kernel hardening guides; SANS hardening guide deep dive; Access controls; Distribution focused; Linux kernel hardening tools; Grsecurity; Lynis; Summary; Chapter 4 : Docker Bench for Security; Docker security -- best practices; Docker -- best practices; CIS guide; Host configuration; Docker daemon configuration; Docker daemon configuration files; Container images/runtime; Docker security operations; The Docker Bench Security application 
505 8 |a Running the toolRunning the tool -- host configuration; Running the tool -- Docker daemon configuration; Running the tool -- Docker daemon configuration files; Running the tool -- container images and build files; Running the tool -- container runtime; Running the tool -- Docker security operations; Understanding the output; Understanding the output -- host configuration; Understanding the output -- the Docker daemon configuration; Understanding the output -- the Docker daemon configuration files; Understanding the output -- container images and build files; Understanding the output -- container runtime 
505 8 |a Understanding the output -- Docker security operationsSummary; Chapter 5 : Monitoring and Reporting Docker Security Incidents; Docker security monitoring; Docker CVE; Mailing lists; Docker security reporting; Responsible disclosure; Security reporting; Additional Docker security resources; Docker Notary; Hardware signing; Reading materials; Awesome Docker; Summary; Chapter 6 : Using Docker's Built-in Security Features; Docker tools; Using TLS; Read-only containers; Docker security fundamentals; Kernel namespaces; Control groups; Linux kernel capabilities; Containers versus virtual machines 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Application software  |x Development  |x Automation. 
650 0 |a Computer software  |x Installation. 
650 0 |a Web servers  |x Computer programs. 
650 0 |a Linux device drivers (Computer programs) 
650 0 |a Virtual computer systems. 
650 6 |a Logiciels d'application  |x Développement  |x Automatisation. 
650 6 |a Logiciels  |x Installation. 
650 6 |a Serveurs Web  |x Logiciels. 
650 6 |a Pilotes de périphérique pour Linux (Logiciels) 
650 6 |a Systèmes virtuels (Informatique) 
650 7 |a COMPUTERS / General  |2 bisacsh 
650 7 |a Linux device drivers (Computer programs)  |2 fast  |0 (OCoLC)fst00999307 
650 7 |a Virtual computer systems.  |2 fast  |0 (OCoLC)fst01167683 
650 7 |a Web servers  |x Computer programs.  |2 fast  |0 (OCoLC)fst01173237 
776 0 8 |i Print version:  |n Druck-Ausgabe 
830 0 |a Community experience distilled. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1214597  |z Texto completo 
938 |a Internet Archive  |b INAR  |n securingdockerle0000gall 
938 |a EBSCOhost  |b EBSC  |n 1214597 
938 |a YBP Library Services  |b YANK  |n 12925552 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis34330422 
994 |a 92  |b IZTAP