You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Transport Layer Security, or TLS, makes ecommerce and online banking possible. It protects your passwords and your privacy. Let's Encrypt transformed TLS from an expensive tool to a free one. TLS understanding and debugging is an essential sysadmin skill you must have. TLS Mastery takes you through: - How TLS works - What TLS provides, and what it doesn't - Wrapping unencrypted connections inside TLS - Assessing TLS configurations - The Automated Certificate Management Environment (ACME) protocol - Using Let's Encrypt to automatically maintain TLS certificates - Online Certificate Status Protocol - Certificate Revocation - CAA, HSTS, and Certificate Transparency - Why you shouldn't run your own CA, and how to do it anyway - and more! Stop wandering blindly around TLS. Master the protocol with TLS Mastery!
DNS The world’s most successful distributed database—and the most naïve. The Domain Name System is one of the Internet’s oldest protocols, designed for a network without hostile users. Intruders targeting a network start by investigating their DNS. DNS Security Extensions, or DNSSEC, hardens DNS and brings it into the 21st century. Learning DNSSEC required wading through years of obsolete tutorials, dead ends, and inscrutable standards. Until now. This new edition of DNSSEC Mastery will have DNS administrators deploying DNSSEC with industry-standard software in hours instead of weeks. You will: · Understand what DNSSEC provides · Configure your servers to resist attack · Verify your environment supports modern DNS · Debug DNSSEC and the Chain of Trust · Sign your zones and attach them to the Chain of Trust · Conceal zone data with NSEC3 · Automate DNSSEC maintenance · Roll over keys to maintain integrity · Implement DNSSEC on private networks · Securely distribute security-critical information via DNS And more! DNSSEC Mastery transforms DNS from a headache to a solution.
21st-Century Data Storage ZFS, the fast, flexible, self-healing filesystem, revolutionized data storage. Leveraging ZFS changes everything about managing FreeBSD systems. With FreeBSD Mastery: ZFS, you’ll learn to: -understand how your hardware affects ZFS -arrange your storage for optimal performance -configure datasets that match your enterprise’s needs -repair and monitor storage pools -expand your storage -use compression to enhance performance -determine if deduplication is right for your data -understand how copy-on-write changes everything -snapshot filesystems -automatically rotate snapshots -clone filesystems -understand how ZFS uses and manages space -do custom FreeBSD ZFS installs Whether you’re a long-term FreeBSD administrator or a new user, FreeBSD Mastery: ZFS will help you simplify storage. Master ZFS with FreeBSD Mastery: ZFS.
Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job. This book saves you from sifting a decade of obsolete online tutorials and quickly gets you running: SSH with the OpenSSH server and the PuTTY and OpenSSH clients. You will: Eliminate passwords. Manage access to your SSH server by users, groups, addresses, and more Securely move files around your network Forward graphic displays from one host to another Forward TCP connections Centrally manage host keys and client configurations Use SSH as a secure transport for other applications Secure applications run over SSH Build Virtual Private Networks with OpenSSH And more! This book simplifies the work of anyone using SSH. Small enough to read and implement quickly, exhaustive enough to include everything most of us need plus a little more. Master SSH with SSH Mastery.
“I’m glad someone’s finally giving ed the attention it deserves.” – Ken Thompson, co-creator of Unix Let me be perfectly clear: ed is the standard Unix text editor. If you don’t know ed, you’re not a real sysadmin. Forty years after ed’s introduction, internationally acclaimed author Michael W Lucas has finally unlocked the mysteries of ed for everyone. With Ed Mastery, you too can become a proper sysadmin. Ed Mastery will help you: · understand buffers and addresses · insert, remove, and mangle text · master file management and shell escapes · comprehend regular expressions, searches, and substitutions · create high-performance scripts for transforming files You must be at least this competent to use this computer. Read Ed Mastery today!
CONFINE YOUR SOFTWARE Jails are FreeBSD’s most legendary feature: known to be powerful, tricky to master, and cloaked in decades of dubious lore. Deploying jails calls upon every sysadmin skill you have, and more—but unleashing lightweight virtualization is so worth it. FreeBSD Mastery: Jails cuts through the clutter to expose the inner mechanisms of jails and unleash their power in your service. You will: · Understand how jails achieve lightweight virtualization · Understand the base system’s jail tools and the iocage toolkit · Optimally configure jail hardware · Manage jails from the host and from within the jail · Optimize disk space usage to support hundreds or thousands of jails · Comfortably work within the limits of jails · Implement fine-grained control of jail features · Build virtual networks · Deploy hierarchical jails · Constrain jail resource usage · And more! Strip away the mystery. Read FreeBSD Mastery: Jails today! “This is the sequel to Git Commit Murder, right ?” /phk, creator of the jail system
No, you are not paranoid. They are out to read your email. In this engaging and oddly reassuring text, practitioner Lucas describes Pretty Good Privacy (PGP) and Open Source GPG for moderately skilled computer geeks who are unfamiliar with public-key cryptography but want a cheap solution to security woes. He covers cryptography, installing OPENPGP
Pluggable Authentication Modules: Threat or Menace? PAM is one of the most misunderstood parts of systems administration. Many sysadmins live with authentication problems rather than risk making them worse. PAM’s very nature makes it unlike any other Unix access control system. If you have PAM misery or PAM mysteries, you need PAM Mastery! With PAM Mastery, you’ll understand: · the different versions of PAM · the intricacies of Linux-PAM and OpenPAM · how PAM policies make decisions · how to debug PAM · the most frequently seen PAM modules · Linux-PAM extended controls and substacks · time-based one-time passwords · using SSH keys for more than SSH · password quality testing · policies from CentOS, Debian, and FreeBSD · and more! Transform PAM from a headache to an ally with PAM Mastery.
If Agatha Christie ran Unix cons The BSD North conference draws some of the smartest people in the world. These few days will validate Dale Whitehead’s work—or expose him as a fraud. When a tragic death devastates the conference, only Dale suspects murder. Computer geeks care about code. But do they care enough… to kill?
SNMP is one of those system management skills that people acquire by experience, stumbling through one horrid implementation after another. SNMP Mastery is your guide to the secret landscape of one of computing's most mysterious tools. Stop stumbling through the SNMP minefield. Read SNMP Mastery today!