Get Free Shipping on orders over $79
Container Security : Fundamental Technology Concepts That Protect Cloud Native Applications - Liz Rice

Container Security

Fundamental Technology Concepts That Protect Cloud Native Applications

By: Liz Rice

eText | 7 October 2025 | Edition Number 2

At a Glance
New Edition

eText


$60.75

or 4 interest-free payments of $15.19 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

As containerized and cloud native applications become foundational to modern software infrastructure, the need for a deep, conceptual understanding of their security implications has never been more urgent. Container Security, second edition, offers a rigorous yet practical examination of the technologies that underpin container platforms—equipping developers, operations professionals, and security practitioners with the mental models needed to evaluate risk and enhance resilience.

Written by Liz Rice, a recognized authority in cloud native security, this updated edition builds on the foundational principles from the first edition while incorporating today's evolving threat landscape, modern tooling, and advancements in platforms like Kubernetes and Linux. Readers will gain a firm grasp of the architectural components behind containers and the Linux primitives that support them, fostering a systems-level understanding of both threats and mitigation strategies.

  • Examine the technical underpinnings of containers through a security-focused lens
  • Evaluate evolving risks and defenses across container runtimes and orchestration platforms
  • Analyze the implications of modern tooling including eBPF and AI-driven approaches
  • Apply core principles to assess and secure real-world deployments in dynamic environments
on
Desktop
Tablet
Mobile

More in Network Security

Cyberethics 8E - Richard A. Spinello

eTEXT

$83.67

Network Security : A Systems Approach - Larry L Peterson

eBOOK

Cybersecurity For Dummies - Joseph Steinberg

eBOOK