The Book of Kubernetes
This hands-on guidebook explains the inner workings of containers, and shows how Kubernetes helps computing, networking, and storage.
This hands-on guidebook explains the inner workings of containers, and shows how Kubernetes helps computing, networking, and storage.
A hands-on, no-nonsense guide for those who land in a DevOps environment and need to get up and running quickly.
Outlines a model for evaluating risks in your life, as well as preparing for a wide range of potential crises.
Kill It with Fire chronicles the challenges of dealing with aging computer systems, along with sound modernization strategies.
Network Programming with Go teaches you how to write clean, secure network software with the programming language designed to make it seem easy.
Powershell for Sysadmins (formerly Automate the Boring Stuff with PowerShell) teaches you how to automate real-world tasks that IT professionals and system administrators deal with every day.
Practical Packet Analysis, 3rd Ed. teaches you how to use Wireshark for packet capture and analysis.
Wicked Cool Shell Scripts, 2nd Edition is a collection of fun tools for sysadmins, web developers, and every Linux user.
The Book of PF, 3rd Edition is the essential guide to building a secure network with PF, the OpenBSD packet filtering tool.
The Book of GNS3 teaches you to use GNS3 to simulate network connections and troubleshoot potential problems, all using a single computer.
Network Flow Analysis teaches the busy network administrator how to build every component of a flow-based network awareness system, and how network analysis and auditing can help address problems and improve network reliability.
The TCP/IP Guide is a must-have addition to the libraries of internetworking students, educators, networking professionals, and those working toward certification.
The Book of IMAP offers a detailed introduction to IMAP and POP3, the two protocols that govern all modern mail servers and clients.
If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and to detect and even prevent compromises.
Hack the FreeBSD kernel for yourself!
Nagios is robust but also complex, and Nagios: System and Network Monitoring, 2nd Edition, updated to address Nagios 3.0, will help you take full advantage of this program.
Cisco Routers for the Desperate, 2nd Edition is designed to be read once and left alone until something breaks. When it does, you'll have everything you need to know in one easy-to-follow guidebook.
This practical and comprehensive guide will teach you how to implement security, create intranets, and more.