The Book of Kubernetes
This hands-on guidebook explains the inner workings of containers, and shows how Kubernetes helps computing, networking, and storage.
This hands-on guidebook explains the inner workings of containers, and shows how Kubernetes helps computing, networking, and storage.
A hands-on, no-nonsense guide for those who land in a DevOps environment and need to get up and running quickly.
Outlines a model for evaluating risks in your life, as well as preparing for a wide range of potential crises.
Kill It with Fire chronicles the challenges of dealing with aging computer systems, along with sound modernization strategies.
Network Programming with Go teaches you how to write clean, secure network software with the programming language designed to make it seem easy.
Powershell for Sysadmins (formerly Automate the Boring Stuff with PowerShell) teaches you how to automate real-world tasks that IT professionals and system administrators deal with every day.
Practical Packet Analysis, 3rd Ed. teaches you how to use Wireshark for packet capture and analysis.
Wicked Cool Shell Scripts, 2nd Edition is a collection of fun tools for sysadmins, web developers, and every Linux user.
The Book of PF, 3rd Edition is the essential guide to building a secure network with PF, the OpenBSD packet filtering tool.
The Book of GNS3 teaches you to use GNS3 to simulate network connections and troubleshoot potential problems, all using a single computer.
Network Flow Analysis teaches the busy network administrator how to build every component of a flow-based network awareness system, and how network analysis and auditing can help address problems and improve network reliability.
"Between 2000 and mid-2008, I've read and reviewed nearly 250 technical books. I've also written several books, so I believe I can recognize a great book when I see it. Linux Firewalls is a great book."
—Richard Bejtlich, TaoSecurity.com, from the foreword to Linux Firewalls
View a sample chapter, Chapter 10: Deploying fwsnort
"If you understand C and want to learn how to manipulate the FreeBSD kernel, Designing BSD Rootkits is for you. Peer into the depths of a powerful operating system and bend it to your will!"
Richard Bejtlich, TaoSecurity
"This book is incredibly detailed, and Wolfgang has done an excellent job. I don’t think I could have gone into that much detail if I wrote a book myself. Kudos!"
—Ethan Galstad, Nagios main developer
"If you are a new network admin, or a systems person just exploring routers and their use, this is a great investment."
—ITworld