Email the Author
You can use this page to email Kim Carter about Docker Security - Quick Reference.
About the Book
The security defaults of Docker are established to get you up and running ("just work") quickly, rather than being the most secure. There are many default configurations that can be improved upon. This book will help you do just that.
Covering the risks and countermeasures of Docker security, based on Kim's own personal experience with Docker environments and discussions with Docker Security Team Lead Diogo Mónica.
Discounts: If you would like a discount, please email me, letting me know how much you would be willing to pay. The less you pay, the more I may consult with you about your reader experience, etc.
Homepage: binarymist.io/publication/docker-security/
Blog Post with details of what's inside this book: binarymist.io/blog/2018/03/31/docker-security/
Authors Other Books: binarymist.io/publication/kims-selected-publications/
What Others Say About Docker Security: binarymist.io/blog/2018/03/31/docker-security/#comments
"The Docker security book saved me hours of time researching this myself. I was able to harden the security of our Docker images without wasting any time." - CR
Authors Homepage: binarymist.io
About the Author
Technologist / Engineer, Information Security Professional, Entrepreneur, creator of PurpleTeam, and the founder of BinaryMist Ltd. OWASP NZ Chapter Leader. Certified Scrum Master. Facilitator, mentor and motivator of cross functional, self managing teams. With a solid 20 years of commercial industry experience across many domains, Kim enjoys teaching others how to apply information security to their Agile processes, bringing the security focus up front where it's the cheapest to implement, increasing profit and reducing costs. Organiser of two information security conferences (OWASP NZ Day and Christchurch Hacker Con), International trainer, speaker, and Software Engineering Radio podcast host, focusing on:
- Software and network architecture
- Web development and engineering
- Information security
Kim is also a regular blog poster at binarymist.io/blog. Kim loves designing and creating robust software and networks, breaking software and networks, then fixing them and helping organisations increase productivity.