Customers in  Europe, Switzerland, and the United Kingdom, please click here.


Attention Existing Customers: Welcome to our new shop! Your account has not been migrated from the old system. If you wish to purchase something, you will need to create a new account or checkout as a guest. Please note that guest checkout is not available for digital products or subscriptions.
ADMIN #63 - Digital Issue

ADMIN #63 - Digital Issue

https://shop.linuxnewmedia.com/web/image/product.template/196/image_1920?unique=d3dfe72

Automation

This issue we are all about automation and configuration with some tools to lighten your load.

DVD contents are not available with the digital edition.

16.99 16.990000000000002 USD 16.99

16.99

Not Available For Sale

    This combination does not exist.


    IN THIS ISSUE:

    Ansible Automator
    This powerful automator does without complex syntax, self-documents, and performs well compared with other configuration management tools.

    CFEngine 3
    This less well known automation tool promises more efficient configuration management and strict compliance with policies.

    Automation with Chef
    The chef de automation combines configuration management, deployment monitoring, and integrated compliance checks.

    Puppet
    The venerable rock of configuration management is not easy to master, but it is flexible and secure for those willing to learn.

    SaltStack
    This fast and reliable modular toolbox contains ready-made modules for many configuration management functions.

    Docker and iptables
    Tune the iptables configuration for Docker by establishing your own forwarding rules.

    HTTP Versions
    Discover the improvements made by HTTP/2 and HTTP/3 over HTTP/1.1.

    Untangle NG Firewall
    Apps come together like pieces of a jigsaw in this easy-to-use but still very powerful firewall solution.

    Hyper-V Security
    With the right settings and small tools, security in virtual environments can be increased significantly by tweaking the on-board tools.

    Traefik
    Traefik promises not only to manage mesh implementations for container environments reliably, but to do so in a way that makes them enjoyable to administer.

    Shadow Permissions in AWS
    Malicious attackers are trying to conquer your AWS castle in the cloud. To mount a strong defense, you'll need a deeper understanding of privilege escalation and shadow admin permissions.

    MySQL Security Tips
    Security safeguards protect data on MySQL servers.

    Ransomware
    The danger of ransomware attacks calls for a robust backup and monitoring strategy.

    Storage Protocols
    The future of flexible, performant, and highly available storage.

    Python Pattern Matching
    A controversial change is taking place in Python version 3.10 known mainly from functional languages: pattern matching.

    Performance Tuning Dojo
    We look at the tools needed to discover, configure, and monitor an accelerated cloud instance, employing the simplest possible tool to get the job done.