Book Image

Learning Docker - Second Edition

By : Vinod Singh, Pethuru Raj, Jeeva S. Chelladhurai
Book Image

Learning Docker - Second Edition

By: Vinod Singh, Pethuru Raj, Jeeva S. Chelladhurai

Overview of this book

Docker is an open source containerization engine that offers a simple and faster way for developing and running software. Docker containers wrap software in a complete filesystem that contains everything it needs to run, enabling any application to be run anywhere – this flexibily and portabily means that you can run apps in the cloud, on virtual machines, or on dedicated servers. This book will give you a tour of the new features of Docker and help you get started with Docker by building and deploying a simple application. It will walk you through the commands required to manage Docker images and containers. You’ll be shown how to download new images, run containers, list the containers running on the Docker host, and kill them. You’ll learn how to leverage Docker’s volumes feature to share data between the Docker host and its containers – this data management feature is also useful for persistent data. This book also covers how to orchestrate containers using Docker compose, debug containers, and secure containers using the AppArmor and SELinux security modules.
Table of Contents (13 chapters)

The security scenario in the containerization domain

Ensuring unbreakable and impenetrable security for any IT systems and business services has been one of the prime needs and the predominant challenges in the IT field for decades now. Brilliant minds can identify and exploit all kinds of security holes and flaws (some of them are being carelessly and unknowingly introduced at the system conceptualization and concretization stages). This loophole ultimately brings innumerable breaches and chaos during IT service delivery. Sometimes, systems are even becoming unavailable for consumers and clients.

Security experts and engineers, on the other hand, try out every kind of trick and technique at their disposal in order to stop hackers in their evil journey. However, it has not been an outright victory so far. Here and there, there are some noteworthy intrusions from unknown sources resulting in highly disconcerting...