Skip to content

Latest commit

 

History

History
116 lines (83 loc) · 12.2 KB

supplementary-readings.md

File metadata and controls

116 lines (83 loc) · 12.2 KB

Microservices Security in Action ~ Supplementary Readings / References

We update this section as and when we find articles/blogs/videos related to the content discussed in this book.

Amazon | Manning | YouTube | Slack

Chapter 2: Securing north/south traffic with an API gateway

Chapter 4: Accessing a secured microservice via a single-page application

Chapter 8: Securing east/west traffic over gRPC

Chapter 9: Securing reactive microservices

Chapter 10: Conquering container security with Docker

Chapter 11: Securing microservices on Kubernetes

Chapter 12: Securing microservices with Istio service mesh

Chapter 13: Secure coding practices and automation

Appendix A: OAuth 2.0 and OpenID Connect

Appendix B: JSON Web Token (JWT)

Appendix E: Docker fundamentals

Appendix F: Open Policy Agent (OPA)

Appendix I: gRPC fundamentals

Appendix J: Kubenrnetes fundamentals

Appendix K: Service mesh and Istio fundamentals