November 2016
Intermediate to advanced
378 pages
8h 37m
English
In this chapter, we will cover the following recipes:
As you move toward container-based applications, one of the items you'll want to put some serious consideration toward is network security. Containers, in particular, can lead to a proliferation in the number of network endpoints that need to be secured. Granted, not all endpoints are fully exposed to the network. However, those that aren't, by default, talk directly to each other, which can cause other concerns. There are many ways to tackle network security when it comes to ...
Read now
Unlock full access