

Buy anything from 5,000+ international stores. One checkout price. No surprise fees. Join 2M+ shoppers on Desertcart.
Desertcart purchases this item on your behalf and handles shipping, customs, and support to EGYPT.
Microservices Security in Action: Design secure network and API endpoint security for Microservices applications, with examples using Java, Kubernetes, and Istio [Siriwardena, Prabath, Dias, Nuwan] on desertcart.com. *FREE* shipping on qualifying offers. Microservices Security in Action: Design secure network and API endpoint security for Microservices applications, with examples using Java, Kubernetes, and Istio Review: More than just security - it lets you master enterprise design for a multi-microservice ecosystem - While the book focuses on security, it does so by illustrating the real-life production considerations of a microservice enterprise deployment. Took my thinking away from the "silo" considerations of how to design 1 microservice to the "enterprise" considerations of how to manage an ecosystem with hundreds of microservices - and what are the key mechanisms through which technologies like Kubernetes and Service Meshes can effectively handle that complexity. The examples were about security but the "ecosystem" mindset applies to much more. Review: Succinct and thorough coverage for kubernetes and istio - One of the best and most thorough tech books I have read. The content is well-written and succinct while thoroughly covering topics and providing links and appendices to learn more. The best praise I can offer is that it does not overwhelm the reader. This is certainly a resource worth having for those responsible for microservices security, as well as those working on or with microservices architectures.
| Best Sellers Rank | #272,352 in Books ( See Top 100 in Books ) #50 in Web Services #134 in Privacy & Online Safety #312 in Internet & Telecommunications |
| Customer Reviews | 4.6 4.6 out of 5 stars (43) |
| Dimensions | 7.38 x 1.1 x 9.25 inches |
| Edition | 1st |
| ISBN-10 | 1617295957 |
| ISBN-13 | 978-1617295959 |
| Item Weight | 2.3 pounds |
| Language | English |
| Print length | 616 pages |
| Publication date | August 4, 2020 |
| Publisher | Manning |
A**Z
More than just security - it lets you master enterprise design for a multi-microservice ecosystem
While the book focuses on security, it does so by illustrating the real-life production considerations of a microservice enterprise deployment. Took my thinking away from the "silo" considerations of how to design 1 microservice to the "enterprise" considerations of how to manage an ecosystem with hundreds of microservices - and what are the key mechanisms through which technologies like Kubernetes and Service Meshes can effectively handle that complexity. The examples were about security but the "ecosystem" mindset applies to much more.
R**Y
Succinct and thorough coverage for kubernetes and istio
One of the best and most thorough tech books I have read. The content is well-written and succinct while thoroughly covering topics and providing links and appendices to learn more. The best praise I can offer is that it does not overwhelm the reader. This is certainly a resource worth having for those responsible for microservices security, as well as those working on or with microservices architectures.
P**E
Excellent book that's full of examples
Awesome book with examples that accompany every chapter. The author created a good balance between theory and practice that really helps understand the concepts. On a scale of one to gem, this book is a precious stone.
J**N
Great Overview of Microservice, Docker, and Kubernetes Security
I highly recommend this book to anyone working on application security or security engineering in a distributed, microservice-based environment.
P**N
Very pleased
Thanks to the authors for taking the time to explain things in detail. I really liked they way they created appendices to further explain topics like how to create a CA, how Docker works, etc. Good job!
C**C
Good material with detailed explanation but still easy to follow
Good book with wealth of materials in Appendix!
K**S
Poor purchase
I wish I knew the code examples were in JAVA and not .NET.
S**B
Best book available to understand the security architecture around microservices
This book drills through various concepts around the state of art security architecture concepts and principles around best practices. A list of comprehensive code examples and detailed interpretations concerning security helps you to glance through the concepts. The specialty of this book is that you should read the concept and be sure to try out and understand concepts. I enjoyed reading / try out (learn by doing it); if anyone who would like to learn security architecture around microservices, I would say this should be the one-stop-shop, also regardless of how experienced you are, a book should be with you all the times, which provides you whole lots of wisdom around architecture best practices.
F**K
Libro interessante Mi aiutato a capire meglio il concetto di sicurezza in un architettura a micro servizio Però nel libro usano OAuth2.0 per l'authentication server e ho notato che quasi tutte le classe di OAuth sono deprecati. Diventa un po' più difficile esercitarsi con il codice nel libro. Sul sito di OAuth2.0 propongono un alternativa: keycloak
A**G
Walked through all the examples and read it cover to cover. Great resource...
Trustpilot
1 month ago
2 weeks ago