Customers in  Europe, Switzerland, and the United Kingdom, please click here.


Attention Existing Customers: Welcome to our new shop! Your account has not been migrated from the old system. If you wish to purchase something, you will need to create a new account or checkout as a guest. Please note that guest checkout is not available for digital products or subscriptions.
ADMIN #63 - Digital Issue

ADMIN #63 - Digital Issue

https://shop.linuxnewmedia.com/web/image/product.template/196/image_1920?unique=550106e

Automation

This issue we are all about automation and configuration with some tools to lighten your load.

DVD contents are not available with the digital edition.

16.99 16.990000000000002 USD 16.99

16.99

Not Available For Sale

This combination does not exist.

ADMIN magazine Digital Issue


IN THIS ISSUE:

Ansible Automator
This powerful automator does without complex syntax, self-documents, and performs well compared with other configuration management tools.

CFEngine 3
This less well known automation tool promises more efficient configuration management and strict compliance with policies.

Automation with Chef
The chef de automation combines configuration management, deployment monitoring, and integrated compliance checks.

Puppet
The venerable rock of configuration management is not easy to master, but it is flexible and secure for those willing to learn.

SaltStack
This fast and reliable modular toolbox contains ready-made modules for many configuration management functions.

Docker and iptables
Tune the iptables configuration for Docker by establishing your own forwarding rules.

HTTP Versions
Discover the improvements made by HTTP/2 and HTTP/3 over HTTP/1.1.

Untangle NG Firewall
Apps come together like pieces of a jigsaw in this easy-to-use but still very powerful firewall solution.

Hyper-V Security
With the right settings and small tools, security in virtual environments can be increased significantly by tweaking the on-board tools.

Traefik
Traefik promises not only to manage mesh implementations for container environments reliably, but to do so in a way that makes them enjoyable to administer.

Shadow Permissions in AWS
Malicious attackers are trying to conquer your AWS castle in the cloud. To mount a strong defense, you'll need a deeper understanding of privilege escalation and shadow admin permissions.

MySQL Security Tips
Security safeguards protect data on MySQL servers.

Ransomware
The danger of ransomware attacks calls for a robust backup and monitoring strategy.

Storage Protocols
The future of flexible, performant, and highly available storage.

Python Pattern Matching
A controversial change is taking place in Python version 3.10 known mainly from functional languages: pattern matching.

Performance Tuning Dojo
We look at the tools needed to discover, configure, and monitor an accelerated cloud instance, employing the simplest possible tool to get the job done.