Customers in Europe and the United Kingdom, please click here.
Attention Existing Customers: Welcome to our new shop! Your account has not been migrated from the old system. If you wish to purchase something, you will need to create a new account or checkout as a guest. Please note that guest checkout is not available for digital products or subscriptions.
ADMIN #61 - Digital Issue
Security is the watchword this issue, and we begin with eliminating container security concerns.
DVD contents are not available with the digital edition.
IN THIS ISSUE:
Container Security with a DMZ
Container technology security is not well defined. We look at several approaches to closing this security gap with hypervisors and buffer zones.
This fast high-performance object storage server has a world-class S3 interface, with features even the original lacks.
Identity and access management plays a central role in modern IT infrastructures. Discover how OpenIAM implements centralized user management.
Version 8 of the popular PHP scripting language comes with a number of innovations and ditches some obsolete features.
Timeout in a Tarpit
Consume an attacker's resources or direct them to a throttled SSH server.
Apache Kafka continuously captures, processes, stores, and integrates data, almost in real time.
A unified interface and surface for orchestrating various clouds and Kubernetes.
Build Secure Containers
The basic container images on which you base your work can often be out of date. We show you how to solve this problem and create significantly leaner containers.
Secure Login with FIDO2
The FIDO and FIDO2 standards support passwordless authentication.
Cybersecurity and ML
Machine learning can address risks and help defend the IT infrastructure by strengthening and simplifying cybersecurity.
Run an on-premises single sign-on service with the option of integrating existing Kerberos or LDAP accounts.
Auto Install with PXE
Automate CentOS and RHEL installation in a preboot execution environment.
This intrusion detection and threat alert tool analyzes logs and identifies suspicious activity in real time.
Four password managers that can help you keep track of all your access credentials.
Why the wall clock time of your parallelized applications do not improve when adding cores.
Managing Microsoft IIS
Manage Microsoft IIS with on-board tools, including the well-known Internet Information Services (IIS) Manager, Windows Admin Center, and PowerShell.
Performance Tuning Dojo
We examine some mathemagical tools that approximate time-to-execute given the parallelizable segment of code.