The Secret Directory


Book Description




The Spectre of Babeuf


Book Description

This study of Babeuf as a political thinker, based on an analysis of his extensive writings, and on scholarship unavailable in English, shows him to be a major precursor of the modern revolutionary socialist tradition. The first part traces Babeuf's political evolution in the context of the French Revolution; the second examines his changing reputation among subsequent historians. The final section assesses the originality of his thought, showing him to be neither a Jacobin nor a Utopian.













Fire in the Minds of Men


Book Description

This book traces the origins of a faith--perhaps the faith of the century. Modern revolutionaries are believers, no less committed and intense than were Christians or Muslims of an earlier era. What is new is the belief that a perfect secular order will emerge from forcible overthrow of traditional authority. This inherently implausible idea energized Europe in the nineteenth century, and became the most pronounced ideological export of the West to the rest of the world in the twentieth century. Billington is interested in revolutionaries--the innovative creators of a new tradition. His historical frame extends from the waning of the French Revolution in the late eighteenth century to the beginnings of the Russian Revolution in the early twentieth century. The theater was Europe of the industrial era; the main stage was the journalistic offices within great cities such as Paris, Berlin, London, and St. Petersburg. Billington claims with considerable evidence that revolutionary ideologies were shaped as much by the occultism and proto-romanticism of Germany as the critical rationalism of the French Enlightenment. The conversion of social theory to political practice was essentially the work of three Russian revolutions: in 1905, March 1917, and November 1917. Events in the outer rim of the European world brought discussions about revolution out of the school rooms and press rooms of Paris and Berlin into the halls of power. Despite his hard realism about the adverse practical consequences of revolutionary dogma, Billington appreciates the identity of its best sponsors, people who preached social justice transcending traditional national, ethnic, and gender boundaries. When this book originally appeared The New Republic hailed it as "remarkable, learned and lively," while The New Yorker noted that Billington "pays great attention to the lives and emotions of individuals and this makes his book absorbing." It is an invaluable work of history and contribution to our understanding of political life.




Kubernetes – An Enterprise Guide


Book Description

Elevate your Kubernetes expertise with seamless Istio integration, cutting-edge security insights, advanced CI/CD strategies, robust Prometheus and Grafana monitoring, all while excelling in multitenancy, secrets management, and global load balancing for exceptional proficiency. Key Features Focuses on what you need to run Kubernetes in an Enterprise environment, based on real-world experience Learn how to secure clusters by adding runtime security and enhancing secrets management using direct pod mounting and Vault integration Get a firm command of Kubernetes from a dual perspective of an admin as well as a developer Book DescriptionStay at the forefront of cloud-native technologies with the eagerly awaited Kubernetes – An Enterprise Guide, Third Edition. Delve deep into Kubernetes and emerge with the latest insights to conquer today's dynamic enterprise challenges. This meticulously crafted edition equips you with the latest insights to skillfully navigate the twists and turns of ever-evolving cloud technology. Experience a more profound exploration of advanced Kubernetes deployments, revolutionary techniques, and expert strategies that redefine your cloud-native skill set. Discover cutting-edge topics reshaping the technological frontier like virtual clusters, container security, and secrets management. Gain an edge by mastering these critical aspects of Kubernetes and propelling your enterprise to new heights. Expertly harness Kubernetes' power for business-critical applications with insider techniques. Smoothly transition to microservices with Istio, excel at modern deployments with GitOps/CI/CD, and bolster security with OPA/Gatekeeper and KubeArmor. Integrate Kubernetes with leading tools for maximum impact in a competitive landscape. Stay ahead of the technology curve with cutting-edge strategies for innovation and growth. Redefine cloud-native excellence with this definitive guide to leveraging Kubernetes.What you will learn Manage Secrets with Vault and External Secret Operator Create multitenant clusters with vCluster for isolated environments Monitor clusters with Prometheus and visualize metrics using Grafana Aggregate and analyze logs centrally with OpenSearch for insights Build a developer platform integrating GitLab and ArgoCD for CI/CD Deploy applications in Istio service mesh and secure them with OPA and GateKeeper Secure your container runtime and halt hackers in their tracks with KubeArmor Who this book is for Tech enthusiasts, DevOps aficionados, and those keen on mastering containerization will revel in the insights offered by this book. Designed for DevOps engineers, developers, and system administrators seeking to amplify their IT journey, this guide is your gateway to next-level Kubernetes expertise. While some familiarity with Docker and Kubernetes is advantageous, fear not if you're new to these concepts. A Kubernetes bootcamp is thoughtfully included, ensuring a seamless learning experience for beginners and those in need of a refresher.




Linux Security


Book Description

Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the standard and advanced techniques you need to know to keep your Linux environment safe from threats of all kinds. Hundreds of clear, consistent examples illustrate these techniques in detail†so you stay on track and accomplish all your goals. Coverage includes: Understanding information and system security procedures Developing a corporate security policy Designing and deploying an effective system and network monitoring strategy Managing the network services offered by Linux servers Understanding Sendmail security, including authentication and privacy Providing application-level mail security using PGP Designing and deploying an Apache HTTP server, including SSL extensions Securing your Samba server Building a network layer firewall using IPtables and Linux kernel v.2.4 Using the NEC SOCKS5 transport layer firewall Deploying the TIS firewall toolkit Offering secure remote connectivity with IPsec and PPTP VPNs Adding strong user authentication to Linux servers using Kerberos Understanding the Linux Pluggable Authentication Modules (PAM)




Getting Started with Containerization


Book Description

Choose the smarter way to learn about containerizing your applications and running them in production. Key FeaturesDeploy and manage highly scalable, containerized applications with KubernetesBuild high-availability Kubernetes clustersSecure your applications via encapsulation, networks, and secretsBook Description Kubernetes is an open source orchestration platform for managing containers in a cluster environment. This Learning Path introduces you to the world of containerization, in addition to providing you with an overview of Docker fundamentals. As you progress, you will be able to understand how Kubernetes works with containers. Starting with creating Kubernetes clusters and running applications with proper authentication and authorization, you'll learn how to create high-availability Kubernetes clusters on Amazon Web Services (AWS), and also learn how to use kubeconfig to manage different clusters. Whether it is learning about Docker containers and Docker Compose, or building a continuous delivery pipeline for your application, this Learning Path will equip you with all the right tools and techniques to get started with containerization. By the end of this Learning Path, you will have gained hands-on experience of working with Docker containers and orchestrators, including SwarmKit and Kubernetes. This Learning Path includes content from the following Packt products: Kubernetes Cookbook - Second Edition by Hideto Saito, Hui-Chuan Chloe Lee, and Ke-Jou Carol HsuLearn Docker - Fundamentals of Docker 18.x by Gabriel N. SchenkerWhat you will learnBuild your own container clusterRun a highly distributed application with Docker Swarm or KubernetesUpdate or rollback a distributed application with zero downtimeContainerize your traditional or microservice-based applicationBuild a continuous delivery pipeline for your applicationTrack metrics and logs for every container in your clusterImplement container orchestration to streamline deploying and managing applicationsWho this book is for This beginner-level Learning Path is designed for system administrators, operations engineers, DevOps engineers, and developers who want to get started with Docker and Kubernetes. Although no prior experience with Docker is required, basic knowledge of Kubernetes and containers will be helpful.




Wiley Pathways Network Security Fundamentals Project Manual


Book Description

You can get there The Network Security Fundamentals Project Manual offers a wealth of easy-to-read, practical, and up-to-date activities that reinforce fundamental network security concepts. You will develop the core competencies and skills you'll need in the real world, including how to: * Install Network Monitor and capture traffic * Encrypt files using folder properties and the cipher command * Install and use Certificate Services * Configure an IPsec policy that requires authentication and encryption * Use RSoP to view effective policy settings * Configure Automatic Updates using the System utility and Group Policy * Choose an IDS and position it on a network With five to seven projects per chapter ranging from easy to more advanced, the Network Security Fundamentals Project Manual is ideal for both traditional and online courses and is an excellent companion to Cole's Network Security Fundamentals ISBN: 978-0-470-10192-6. Wiley Pathways helps you achieve your goals The texts and project manuals in this series offer a coordinated curriculum for learning information technology. Learn more at www.wiley.com/go/pathways.