Skip to Content


Customers in Europe or the United Kingdom (EUR/GBP), please click here.


ADMIN #92 - Digital Issue

https://shop.linuxnewmedia.com/web/image/product.template/880/image_1920?unique=46d5bf1

Issue #92 – Non-Human Identity Management

Address the increasing number of attack surfaces presented by NHIs by focusing on attribute and capability descriptions.

DVD contents are not available with the digital edition.

17.99 17.99 USD 17.99

Not Available For Sale

This combination does not exist.

IN THIS ISSUE:

Management
Many non-human identities – workloads in the cloud, service accounts in IT systems, autonomous agents in AI applications – are poorly managed or not managed at all. We present a strategic, holistic approach to managing these identities.

Prometheus plus Cortex
This monitoring, alerting, and trending software is considered the standard, but it is slow when faced with a large volume of historical data. Cortex comes to the rescue, with cluster support, as well.

Uptime Kuma
A combination of easy installation, attractive interface, and extensive feature set makes Uptime Kuma a good choice for self-hosted uptime monitoring.

Azure Storage Explorer
Manage, automate, and perform diagnostics while supporting Azurite storage integration, shared access signature management, and error analysis.

Datapizza-AI PHP
Orchestrate API-first agents and local vector stores on constrained hardware without GPUs.

IPv6-Mostly Networks
Offer the best user experience while reducing IPv4 resource consumption to a minimum.

Java Memory Management
Scale the steep Java memory management learning curve while keeping applications up and running and looking for trends that signal imminent crashes.

Forced Tunneling
The Microsoft security service tunnels all traffic from Azure resources downstream, so Internet-bound traffic can be inspected and monitored by a local firewall before it leaves the regional Azure gateway.

Geofencing
Use geofence technology to isolate your web services from the broader public Internet with custom security rules and worker routes.

Prowler
Systematically check your AWS infrastructure for vulnerabilities, meet compliance requirements, and automatically plug security gaps.

MITRE Caldera
Emulate attacks and optimize monitoring with automated security testing that facilitates the work of red and blue teams.

Bloonix
Combine the numerous monitoring services in complex environments into a single interface.

Data Collection with Zabbix
Available system utilities and tools can provide reliable, policy-compliant monitoring coverage in restricted environments where traditional approaches fail.

Certificate Enrollment Web Service
Obtain X.509 certificates for Linux systems from Active Directory Certificate Services with a combination of standard Unix utilities, zabbix_sender, and scheduled execution by crontab files.

Real-Time Ethernet
The replacement of first-generation fieldbuses with real-time Ethernet creates a single network that extends from the control level in the office to field devices, but admins have to struggle with the lack of a single uniform standard.