null
Loading... Please wait...
FREE SHIPPING on All Unbranded Items LEARN MORE
Print This Page

Microservices Security in Action

List Price: $69.99
SKU:
9781617295959
Quantity:
Minimum Purchase
25 unit(s)
  • Availability: Confirm prior to ordering
  • Branding: minimum 50 pieces (add’l costs below)
  • Check Freight Rates (branded products only)

Branding Options (v), Availability & Lead Times

  • 1-Color Imprint: $2.00 ea.
  • Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
  • Belly-Band Wrap: $2.50 ea. (full-color printed)
  • Set-Up Charge: $45 per decoration
FULL DETAILS
  • Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
  • Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
  • Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
  • RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
  • Product Details

    Author:
    Prabath Siriwardena, Nuwan Dias
    Format:
    Paperback
    Pages:
    616
    Publisher:
    Manning (August 4, 2020)
    Language:
    English
    ISBN-13:
    9781617295959
    ISBN-10:
    1617295957
    Weight:
    29.6oz
    Dimensions:
    7.375" x 9.25" x 1.1"
    File:
    Eloquence-SimonSchuster_05022026_P10038138_onix30_Complete-20260502.xml
    Folder:
    Eloquence
    List Price:
    $69.99
    Series:
    In Action
    Case Pack:
    12
    As low as:
    $62.99
    Publisher Identifier:
    P-SS
    Discount Code:
    G
    Pub Discount:
    37
    Imprint:
    Manning
  • Overview

    ”A complete guide to the challenges and solutions in securing microservices architectures.” —Massimo Siani, FinDynamic

    Key Features
    Secure microservices infrastructure and code
    Monitoring, access control, and microservice-to-microservice communications
    Deploy securely using Kubernetes, Docker, and the Istio service mesh.
    Hands-on examples and exercises using Java and Spring Boot

    Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

    Microservices Security in Action teaches you how to address microservices-specific security challenges throughout the system. This practical guide includes plentiful hands-on exercises using industry-leading open-source tools and examples using Java and Spring Boot.

     


    About The Book
    Design and implement security into your microservices from the start. Microservices Security in Action teaches you to assess and address security challenges at every level of a Microservices application, from APIs to infrastructure. 

    You’ll find effective solutions to common security problems, including throttling and monitoring, access control at the API gateway, and microservice-to-microservice communication. Detailed Java code samples, exercises, and real-world business use cases ensure you can put what you’ve learned into action immediately.

    What You Will Learn

    Microservice security concepts
    Edge services with an API gateway
    Deployments with Docker, Kubernetes, and Istio
    Security testing at the code level
    Communications with HTTP, gRPC, and Kafka

    This Book Is Written For
    For experienced microservices developers with intermediate Java skills.

    About The Author
    Prabath Siriwardena is the vice president of security architecture at WSO2. Nuwan Dias is the director of API architecture at WSO2. They have designed secure systems for many Fortune 500 companies.

    Table of Contents

    PART 1 OVERVIEW
    1 Microservices security landscape
    2 First steps in securing microservices

    PART 2 EDGE SECURITY
    3 Securing north/south traffic with an API gateway
    4 Accessing a secured microservice via a single-page application
    5 Engaging throttling, monitoring, and access control

    PART 3 SERVICE-TO-SERVICE COMMUNICATIONS
    6 Securing east/west traffic with certificates
    7 Securing east/west traffic with JWT
    8 Securing east/west traffic over gRPC
    9 Securing reactive microservices

    PART 4 SECURE DEPLOYMENT
    10 Conquering container security with Docker
    11 Securing microservices on Kubernetes
    12 Securing microservices with Istio service mesh

    PART 5 SECURE DEVELOPMENT
    13 Secure coding practices and automation