Podman Core Rootless Containers and Secure Pods
Sobczak, Tytus
Sold by PBShop.store US, Wood Dale, IL, U.S.A.
AbeBooks Seller since April 7, 2005
New - Soft cover
Condition: New
Ships within U.S.A.
Quantity: Over 20 available
Add to basketSold by PBShop.store US, Wood Dale, IL, U.S.A.
AbeBooks Seller since April 7, 2005
Condition: New
Quantity: Over 20 available
Add to basketNew Book. Shipped from UK. Established seller since 2000.
Seller Inventory # L2-9798276709086
Podman Core Rootless Containers and Secure Pods gives you a direct path into container work with clear steps, simple workflows, and secure defaults. The book focuses on rootless operations, daemonless execution, and mapped Docker commands. Each chapter shows you how to build, run, and manage containers without background services. You work with pods, images, registries, networks, logging, and hardening rules in a structured way. The content stays practical, so you follow real tasks from installation to daily operations.
You learn how rootless environments reduce the risk of elevated processes. You see how daemonless workflows lower system load. You work with containers that respect user boundaries. You gain strong control over pods with clear separation between services. You also build confidence by mapping Docker commands to Podman, so you keep your existing habits while improving security.
The book explains setup on Linux, macOS, and Windows. You learn how to install Podman, prepare the environment, handle storage, and troubleshoot common failures. You run containers with simple commands. You build images with structured files. You manage volumes, ports, and custom networks. You pull and push to registries. You use pod definitions to group related services. You track logs with timestamps. You inspect metrics for performance. You follow hardening rules that lower exposure to attacks. You apply these steps to real project chapters that show full workflows.
WHO THE BOOK IS FOR
• Engineers who want clear container workflows
• Developers moving from Docker to Podman
• Sysadmins seeking rootless security
• Students who need predictable steps
• Teams that want simple container operations with less risk
WHY THE BOOK
• You reduce attack surface with rootless setups
• You lower overhead with daemonless execution
• You keep your Docker experience through mapped commands
• You follow structured pod design
• You gain repeatable workflows that support real systems
WHAT IS INSIDE THE BOOK
• Installation across platforms
• Rootless environment setup
• Daemonless operations
• Docker to Podman command mapping
• Pod design and secure grouping of services
• Networking, images, registries, and volumes
• Logging and metrics
• Hardening rules for containers and pods
• Full workflow chapters based on real tasks
"About this title" may belong to another edition of this title.
Returns Policy
We ask all customers to contact us for authorisation should they wish to return their order. Orders returned without authorisation may not be credited.
If you wish to return, please contact us within 14 days of receiving your order to obtain authorisation.
Returns requested beyond this time will not be authorised.
Our team will provide full instructions on how to return your order and once received our returns department will process your refund.
Please note the cost to return any...
Books are shipped from UK warehouse. Delivery thereafter is between 4 and 14 business days dependant upon your location - please do contact us with any queries you may have.
| Order quantity | 7 to 14 business days | 7 to 14 business days |
|---|---|---|
| First item | US$ 0.00 | US$ 0.00 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.