Product description ※Please note that product information is not in full comprehensive meaning because of the machine translation.
Computer
Application development using Docker and Kubernetes is becoming commonplace. Vulnerabilities are still frequently found in container implementations. This book is the most comprehensive and detailed book on how to configure Docker and Kubernetes security and use helpful tools. Use this book to enhance security and protect containers from deliberate attacks.