August 2020
Intermediate to advanced
616 pages
18h 7m
English
Part 1. Overview
1 Microservices security landscape
2 First steps in securing microservices
Part 2. Edge security
3 Securing north/south traffic with an API gateway
4 Accessing a secured microservice via a single-page application
5 Engaging throttling, monitoring, and access control
Part 3. Service-to-service communications
6 Securing east/west traffic with certificates
7 Securing east/west traffic with JWT
8 Securing east/west traffic over gRPC
9 Securing reactive microservices
Part 4. Secure deployment
10 Conquering container security with Docker
11 Securing microservices on Kubernetes
12 Securing microservices with Istio service mesh
Part 5. Secure development