Microservices Security in Action Audiobook By Prabath Siriwardena, Nuwan Dias cover art

Microservices Security in Action

Design Secure Network and API Endpoint Security for Microservices Applications, with Examples Using Java, Kubernetes, and Istio

Preview
Get this deal Try for $0.00
Offer ends December 16, 2025 11:59pm PT.
Prime logo Prime members: New to Audible? Get 2 free audiobooks during trial.
Just $0.99/mo for your first 3 months of Audible Premium Plus.
1 audiobook per month of your choice from our unparalleled catalog.
Listen all you want to thousands of included audiobooks, podcasts, and Originals.
Auto-renews at $14.95/mo after 3 months. Cancel anytime.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.

Microservices Security in Action

By: Prabath Siriwardena, Nuwan Dias
Narrated by: Aiden Humphreys
Get this deal Try for $0.00

$14.95/mo after 3 months. Cancel anytime. Offers ends December 16, 2025 11:59pm PT.

$14.95/month after 30 days. Cancel anytime.

Buy for $29.95

Buy for $29.95

Get 3 months for $0.99 a month

About the technology

Integrating independent services into a single system presents special security challenges in a microservices deployment. With proper planning, however, you can build in security from the start. Learn to create secure services and protect application data throughout development and deployment. As microservices continue to change enterprise application systems, developers and architects must learn to integrate security into their design and implementation. Because microservices are created as a system of independent components, each a possible point of failure, they can multiply the security risk.

About the book

Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Along the way, authors and software security experts Prabath Siriwardena and Nuwan Dias shine a light on important concepts like throttling, analytics gathering, access control at the API gateway, and microservice-to-microservice communication. You'll also discover how to securely deploy microservices using state-of-the-art technologies including Kubernetes, Docker, and the Istio service mesh. When you're finished listening, you'll be planning, designing, and implementing microservices applications with the priceless confidence that comes with knowing they're secure!

What's inside

  • Microservice security concepts
  • Edge services with an API gateway
  • Deployments with Docker, Kubernetes, and Istio
  • Security testing at the code level
  • Communications with HTTP, gRPC, and Kafka

About the audience

For experienced microservices developers with intermediate Java skills.

About the authors

Prabath Siriwardena is the vice president of security architecture at WSO2. Nuwan Dias is the director of API architecture at WSO2. They have designed secure systems for many Fortune 500 companies.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2020 Manning Publications (P)2021 Manning Publications
Programming & Software Development Security & Encryption Technology Software Development Software Computer Security Programming

People who viewed this also viewed...

API Security in Action Audiobook By Neil Madden cover art
API Security in Action By: Neil Madden
The DevOps Handbook, Second Edition Audiobook By Gene Kim, Jez Humble, Patrick Debois, John Willis, Nicole Forsgren cover art
The DevOps Handbook, Second Edition By: Gene Kim, and others
All stars
Most relevant
This is one of those technical books that go into code-level detail using specific techs rather than focusing on general principles. First of all it makes it very difficult to listen to. The narrator does his best and has a clear voice but it would have made sense not to pronounce each command as-is but just skip all the special characters. Secondly, focusing on specific tech makes it more difficult to apply in other techs and tends to become out-dated. E.g. rather than explaining how to generate certificates command-by-command using openssl, they could've just explained how certificate chains etc. work.

I doubt I can listen this to the end. I won't be buying the ebook either because I don't want a step-by-step book.

Not suitable for an audio book

Something went wrong. Please try again in a few minutes.