Customers in  Europe, Switzerland, and the United Kingdom, please click here.


Attention Existing Customers: Welcome to our new shop! Your account has not been migrated from the old system. If you wish to purchase something, you will need to create a new account or checkout as a guest. Please note that guest checkout is not available for digital products or subscriptions.
ADMIN #80 - Print Issue

ADMIN #80 - Print Issue

https://shop.linuxnewmedia.com/web/image/product.template/259/image_1920?unique=92b6fce

Threat Management

Digital infrastructures are vulnerable to all kinds of attacks. In this issue, we look at strategies and tools to detect and defend.

On the DVD: openSUSE Leap 15.5

16.99 16.990000000000002 USD 16.99

16.99

Not Available For Sale

    This combination does not exist.


    IN THIS ISSUE:

    Threat Detection
    The open source tool Velociraptor is at the heart of a solution that automatically detects cyber threats in industrial environments, offering a defensive strategy and protecting critical infrastructures.

    Container Security
    Vulnerable software and incorrect settings cause problems, but administrators have some tools at hand that can help with container security.

    Hardening Mail Servers
    If you don't want to hand over your mail to a corporation, you have to operate your own mail server. Securing it sensibly involves some effort.

    Security Onion
    This network and enterprise security monitoring solution bundles numerous individual Linux tools that help you monitor networks or fend off attacks to create a standardized platform for securing IT environments.

    Azure Application Gateway
    In the Azure cloud, Microsoft offers the AAG managed service as a Layer 7 load balancer that needs virtually no internal resources to set up and operate.

    Scripting Chatbots
    We look at the limited capabilities of artificial intelligence scripting with free large language models and suggest where it might work best.

    MySQL 5.7 to 8.0 Upgrade
    A number of breaking changes have been introduced between MySQL 5.7 and 8.0. We show you how to navigate this mandatory upgrade.

    Compact Kubernetes
    We look at three scaled-down, compact Kubernetes distributions for operation on edge devices or in small branch office environments.

    Microsoft Bicep
    This fairly new domain-specific language creates Azure resources in the cloud. What can it do, and what advantages does it offer admins?

    WPCloudDeploy
    Reduce hosting costs for your fleet of WordPress cloud servers by managing dozens or even hundreds of servers and sites with WordPress-specific smarts.

    DefectDojo
    This vulnerability management tool helps development teams and admins identify, track, and fix vulnerabilities early in the software development process.

    Windows Ransomware Protection
    Ransomware defense involves two strategies: identifying attacks and slowing the attackers to mitigate their effects.

    Kubescape
    Scan Kubernetes container setups for vulnerabilities and misconfigurations to improve security and compliance.

    RustDesk
    An open source client and basic server are the basis for this self-hosted, cross-platform remote desktop access software designed to provide support and maintenance.

    Hyper-V Resilience
    Back up Hyper-V with Azure Site Recovery and prepare for failover.

    Performance Dojo
    Bottom is the latest process and system monitoring terminal user interface tool, delivering lightweight but beautiful monitoring.