Security of Linux containers in the cloud

system librarian um Faculty of Humanities and Social Sciences, University of Zagreb
20. Sep 2012
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
Security of Linux containers in the cloud
1 von 20

Más contenido relacionado

Was ist angesagt?

Veer's Container SecurityVeer's Container Security
Veer's Container SecurityJim Barlow
Ten layers of container security  for CloudCamp Nov 2017Ten layers of container security  for CloudCamp Nov 2017
Ten layers of container security for CloudCamp Nov 2017Gordon Haff
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13Zach Hill
Container securityContainer security
Container securityAnthony Chow
Lxc – next gen virtualization for cloud   intro (cloudexpo)Lxc – next gen virtualization for cloud   intro (cloudexpo)
Lxc – next gen virtualization for cloud intro (cloudexpo)Boden Russell
FreeBSD is not LinuxFreeBSD is not Linux
FreeBSD is not LinuxMuhammad Moinur Rahman

Destacado

Linux Security MythLinux Security Myth
Linux Security MythMackenzie Morgan
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linuxAmmar WK
Linux SecurityLinux Security
Linux Securitynayakslideshare
How Many Linux Security Layers Are Enough?How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?Michael Boelen
Kernel Recipes 2013 - Linux Security Modules: different formal conceptsKernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal conceptsAnne Nicolas
Linux Security Scanning with LynisLinux Security Scanning with Lynis
Linux Security Scanning with LynisMichael Boelen

Similar a Security of Linux containers in the cloud

Linuxcon Barcelon 2012: LXC Best PracticesLinuxcon Barcelon 2012: LXC Best Practices
Linuxcon Barcelon 2012: LXC Best Practiceschristophm
Lightweight Virtualization: LXC Best PracticesLightweight Virtualization: LXC Best Practices
Lightweight Virtualization: LXC Best PracticesWerner Fischer
Linux container & dockerLinux container & docker
Linux container & dockerejlp12
Evoluation of Linux Container VirtualizationEvoluation of Linux Container Virtualization
Evoluation of Linux Container VirtualizationImesh Gunaratne
Evolution of Linux Containerization Evolution of Linux Containerization
Evolution of Linux Containerization WSO2
Linux Containers & DockerLinux Containers & Docker
Linux Containers & DockerJumping Bean

Más de Dobrica Pavlinušić

Mainline kernel on ARM Tegra20 devices that are left behind on 2.6 kernelsMainline kernel on ARM Tegra20 devices that are left behind on 2.6 kernels
Mainline kernel on ARM Tegra20 devices that are left behind on 2.6 kernelsDobrica Pavlinušić
Linux+sensor+device-tree+shell=IoT !Linux+sensor+device-tree+shell=IoT !
Linux+sensor+device-tree+shell=IoT !Dobrica Pavlinušić
bro - what is in my network?bro - what is in my network?
bro - what is in my network?Dobrica Pavlinušić
Let's hack cheap hardware 2016 editionLet's hack cheap hardware 2016 edition
Let's hack cheap hardware 2016 editionDobrica Pavlinušić
Raspberry Pi - best friend for all your GPIO needsRaspberry Pi - best friend for all your GPIO needs
Raspberry Pi - best friend for all your GPIO needsDobrica Pavlinušić
Cheap, good, hackable tools from China: AVR component testerCheap, good, hackable tools from China: AVR component tester
Cheap, good, hackable tools from China: AVR component testerDobrica Pavlinušić

Más de Dobrica Pavlinušić(20)

Último

Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
Industry 4.0.pdfIndustry 4.0.pdf
Industry 4.0.pdfTery Lockitski
Easy Salesforce CI/CD with Open Source Only - Dreamforce 23Easy Salesforce CI/CD with Open Source Only - Dreamforce 23
Easy Salesforce CI/CD with Open Source Only - Dreamforce 23NicolasVuillamy1
Document Understanding as Cloud APIs and Generative AI Pre-labeling Extractio...Document Understanding as Cloud APIs and Generative AI Pre-labeling Extractio...
Document Understanding as Cloud APIs and Generative AI Pre-labeling Extractio...DianaGray10
Unleashing the Power of Modern Carpooling Apps, Inspired by BlaBlaCarUnleashing the Power of Modern Carpooling Apps, Inspired by BlaBlaCar
Unleashing the Power of Modern Carpooling Apps, Inspired by BlaBlaCarArchie Cadell
Keynote: Two years at the British Library... and counting / Alan Danskin (Bri...Keynote: Two years at the British Library... and counting / Alan Danskin (Bri...
Keynote: Two years at the British Library... and counting / Alan Danskin (Bri...CILIP MDG

Último(20)

Security of Linux containers in the cloud