Securing Microservices with Istio Service Mesh

Security expert Prabath Siriwardena shows you how to secure Microservices with Istio Service Mesh.

What Are Web APIs?

From Developing Microservice APIs with Python by Jose Haro Peralta

In this article we will explain what web APIs are. You will learn that a web API is a specific instance of the more general concept of Application Programming Interface (API). It is important to understand that an API is just a layer on top of an application, and that there are many different types of interfaces.

How Does OAuth 2 Work?

From Spring Security in Action by Laurentiu Spilca In this article, we discuss the components which act in an OAuth 2 authentication implementation. You need to know these components and the role they play in order to properly implement them…. Continue Reading →

Deployment of Fluentd

From Unified Logging with Fluentd by Phil Wilkins

This article describes how and when to deploy Fluentd.

Bringing Fluentd to Life with “Hello World”

From Unified Logging with Fluentd by Phil Wilkins

Let’s image that you’re familiar with Fluentd’s architecture and how to deploy it and dive right into the classic “Hello World” exercise.

Shallow Transfer Learning in NLP

From Transfer Learning for Natural Language Processing by Paul Azunre

This article delves into using shallow transfer learning to improve your NLP models.

Getting Started with Baselines

From Transfer Learning for Natural Language Processing by Paul Azunre

This article discusses getting started with baselines and generalized linear models.

Organize your logs

From Logging in Action by Phil Wilkins

Capability-Based Security and Macaroons

From API Security in Action by Neil Madden

In this article, you’ll implement capability-based access control techniques that enable secure sharing by taking the principle of least authority (POLA) to its logical conclusion and allowing fine-grained control over access to individual resources. Along the way, you’ll see how capabilities prevent a general category of attacks against APIs known as confused deputy attacks.

OWASP API Security Top 10

From Microservices Security in Action by Prabath Siriwardena

This article explores the OWASP API top-ten list of API security vulnerabilities.

© 2021 Manning — Design Credits