Customers in  Europe, Switzerland, and the United Kingdom, please click here.


Attention Existing Customers: Welcome to our new shop! Your account has not been migrated from the old system. If you wish to purchase something, you will need to create a new account or checkout as a guest. Please note that guest checkout is not available for digital products or subscriptions.
ADMIN #61 - Print Issue

ADMIN #61 - Print Issue

https://shop.linuxnewmedia.com/web/image/product.template/155/image_1920?unique=5c185ba

Secure Containers

Security is the watchword this issue, and we begin with eliminating container security concerns.

On the DVD: Clonezilla Live 2.7.

16.99 16.990000000000002 USD 16.99

16.99

Not Available For Sale

    This combination does not exist.


    IN THIS ISSUE:

    Container Security with a DMZ
    Container technology security is not well defined. We look at several approaches to closing this security gap with hypervisors and buffer zones.

    MinIO
    This fast high-performance object storage server has a world-class S3 interface, with features even the original lacks.

    OpenIAM
    Identity and access management plays a central role in modern IT infrastructures. Discover how OpenIAM implements centralized user management.

    PHP 8
    Version 8 of the popular PHP scripting language comes with a number of innovations and ditches some obsolete features.

    Timeout in a Tarpit
    Consume an attacker's resources or direct them to a throttled SSH server.

    Apache Kafka
    Apache Kafka continuously captures, processes, stores, and integrates data, almost in real time.

    Pulumi
    A unified interface and surface for orchestrating various clouds and Kubernetes.

    Build Secure Containers
    The basic container images on which you base your work can often be out of date. We show you how to solve this problem and create significantly leaner containers.

    Secure Login with FIDO2
    The FIDO and FIDO2 standards support passwordless authentication.

    Cybersecurity and ML
    Machine learning can address risks and help defend the IT infrastructure by strengthening and simplifying cybersecurity.

    Keycloak
    Run an on-premises single sign-on service with the option of integrating existing Kerberos or LDAP accounts.

    Auto Install with PXE
    Automate CentOS and RHEL installation in a preboot execution environment.

    Teler
    This intrusion detection and threat alert tool analyzes logs and identifies suspicious activity in real time.

    Password Managers
    Four password managers that can help you keep track of all your access credentials.

    Parallel Performance
    Why the wall clock time of your parallelized applications do not improve when adding cores.

    Managing Microsoft IIS
    Manage Microsoft IIS with on-board tools, including the well-known Internet Information Services (IIS) Manager, Windows Admin Center, and PowerShell.

    Performance Tuning Dojo
    We examine some mathemagical tools that approximate time-to-execute given the parallelizable segment of code.