version 1.102, 2015/07/02 05:49:03 |
version 1.103, 2016/01/29 19:03:31 |
|
|
<html> |
<html> |
<head> |
<head> |
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> |
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> |
<meta name="description" content="Books about BSD and OpenBSD"> |
<meta name="description" content="Books about OpenBSD and UNIX"> |
<meta name="copyright" content="This document copyright 1998-2007 by OpenBSD."> |
<meta name="copyright" content="This document copyright 1998-2016 by OpenBSD."> |
<meta name="generator" content="The vi editor from UNIX"> |
<meta name="generator" content="The vi editor from UNIX"> |
<meta name="Author" content="Ian Darwin"> |
<meta name="Author" content="Ian Darwin"> |
<title>The OpenBSD Bookstore</title> |
<title>Books about OpenBSD and UNIX</title> |
<link rel="canonical" href="http://www.openbsd.org/books.html"> |
<link rel="canonical" href="http://www.openbsd.org/books.html"> |
</head> |
</head> |
|
|
|
|
<a href="index.html"><img alt="[OpenBSD]" height="30" width="141" border="0" src="images/smalltitle.gif"></a> |
<a href="index.html"><img alt="[OpenBSD]" height="30" width="141" border="0" src="images/smalltitle.gif"></a> |
<p> |
<p> |
<h2><font color="#cc0000">UNIX and BSD books</font></h2> |
<h2><font color="#cc0000">UNIX and BSD books</font></h2> |
|
Note that the information in some older books may no longer be accurate |
|
or relevant to modern OpenBSD. |
<hr> |
<hr> |
|
|
<h3>OpenBSD-specific books</h3> |
<h3>OpenBSD-specific books</h3> |
|
|
<dd>ISBN-10: 1-59327-589-7 |
<dd>ISBN-10: 1-59327-589-7 |
<dd>ISBN-13: 978-1-59327-589-1 |
<dd>ISBN-13: 978-1-59327-589-1 |
<dd>Copyright 2015. |
<dd>Copyright 2015. |
<dd> |
|
The first sentence of this book is, "<i>This is a book about building the |
|
network you need</i>". Taking it from there, Peter walks you through the whys |
|
and the hows of building the high performance, low maintenance network you need, |
|
using OpenBSD tools.<br> |
|
The book covers all bases from the basic one machine configuration and basic |
|
local area networks, all the way up to configurations with traffic shaping and |
|
load balancing with "self healing" networks and countermeasures against common |
|
problems such as DoS attempts and spamming. A basic understanding of TCP/IP |
|
and some Unix knowledge is assumed.<br> |
|
The official book website for a sample chapter, table of contents and errata |
|
can be found at |
|
<a href="http://www.nostarch.com/pf3">http://www.nostarch.com/pf3</a>. |
|
<p> |
<p> |
|
The first sentence of this book is "<i>This is a book about building the |
|
network you need.</i>" Taking it from there, Peter walks you through the whys |
<dt><a name="book8"><i>The Book of PF, 2nd Edition<br> |
|
A No-Nonsense Guide to the OpenBSD Firewall</i></a> |
|
<dd>by Peter N. M. Hansteen |
|
<dd>ISBN-13: 978-1-59327-274-6 |
|
<dd>November 2010. |
|
<dd> |
|
The first sentence of this book is, "<i>This is a book about building the |
|
network you need</i>". Taking it from there, Peter walks you through the whys |
|
and the hows of building the high performance, low maintenance network you need, |
and the hows of building the high performance, low maintenance network you need, |
using OpenBSD tools.<br> |
using OpenBSD tools. |
The book covers all bases from the basic one machine configuration and basic |
The book covers all bases, from the basic one machine configuration and basic |
local area networks, all the way up to configurations with traffic shaping and |
local area networks, all the way up to configurations with traffic shaping and |
load balancing with "self healing" networks and countermeasures against common |
load balancing with "self-healing" networks and countermeasures against common |
problems such as DoS attempts and spamming. A basic understanding of TCP/IP |
problems such as DoS attempts and spamming. A basic understanding of TCP/IP |
and some Unix knowledge is assumed.<br> |
and some Unix knowledge is assumed. |
The official book website for a sample chapter, table of contents and errata |
The official book website for a sample chapter, table of contents and errata |
can be found at |
can be found <a href="http://www.nostarch.com/pf3">here</a>. |
<a href="http://www.nostarch.com/pf2.htm">http://www.nostarch.com/pf2.htm</a>. |
|
<p> |
<p> |
|
|
|
|
<dt><a name="book9"><i>SSH Mastery</i></a> |
<dt><a name="book9"><i>SSH Mastery</i></a> |
<dd>by Michael Lucas |
<dd>by Michael W. Lucas |
<dd>ISBN-13: 978-1470069711 |
<dd>ISBN-13: 978-1470069711 |
<dd>ISBN-10: 1470069717 |
<dd>ISBN-10: 1470069717 |
<dd>February 2012, 145 pp. |
<dd>February 2012, 145 pp. |
<dd>OpenSSH, PuTTY, Tunnels, and Keys |
<dd>OpenSSH, PuTTY, Tunnels, and Keys |
<dd> |
<p> |
|
|
A guide to what you need to know about SSH. This book will help you |
A guide to what you need to know about SSH. This book will help you |
eliminate passwords on your network, tunnel unencrypted protocols |
eliminate passwords on your network, tunnel unencrypted protocols |
through secure channels, build VPNs with OpenSSH, and more. Focuses on |
through secure channels, build VPNs with OpenSSH, and more. Focuses on |
the OpenSSH server, the OpenSSH client, and the PuTTY client. |
the OpenSSH server, the OpenSSH client, and the PuTTY client. |
Michael W Lucas is the author of Absolute OpenBSD and other BSD books. |
Michael W. Lucas is the author of <i>Absolute OpenBSD</i> and other BSD books. |
Helping support OpenBSD, Michael is contributing all his author's profits, from |
The official SSH Mastery website is |
orders via the main OpenBSD order page, back to the project. |
<a href="https://www.michaelwlucas.com/nonfiction/ssh-mastery">here</a>. |
<br><a href="https://www.michaelwlucas.com/nonfiction/ssh-mastery">The |
|
official SSH Mastery website is here</a> |
|
|
|
<p> |
<p> |
|
|
|
|
<dt><a name="book11"><i>Sudo Mastery</i></a> |
|
<dd>by Michael Lucas |
|
<dd>ISBN-13: 978-1493626205 |
|
<dd>ISBN-10: 1493626205 |
|
<dd>October 2013, 144pp. |
|
<dd>Access Control for Real People |
|
<dd> |
|
|
|
Unix-like operating systems use a rudimentary access control system: |
|
the root account can do anything, while other users are peasants with |
|
only minimal access. This worked fine in UNIX's youth, but today, |
|
system administration responsibilities are spread among many people |
|
and applications. Different people may need different slices of |
|
root's power. However pros and cons are considered as well.<p> |
|
|
|
This book also thoroughly covers extended features used in other |
|
operating systems, but not supported in OpenBSD's more minimalist |
|
policy. |
|
|
|
<br><a href="https://www.michaelwlucas.com/nonfiction/sudo-mastery">The |
|
official Sudo Mastery website is here</a> |
|
|
|
<p> |
|
|
|
|
|
|
|
<dt><a name="book12"><i>DNSSEC Mastery</i></a> |
|
<dd>by Michael Lucas |
|
<dd>ISBN-13: 978-1484924471 |
|
<dd>ISBN-10: 1484924479 |
|
<dd>May 2013, 130 pp. |
|
<dd>Securing the Domain Name System with Bind. |
|
<dd> |
|
|
|
DNS is one of the oldest protocols on the Internet, and was designed |
|
for a network without hostile users. Anyone who wants to break into a |
|
network starts by investigating the target's Domain Name Service. <p> |
|
|
|
In addition to providing a manual for "bind", which is in OpenBSD's |
|
default configuration, this book thoroughly targets the extensions |
|
which are available in the port net/isc-bind. DNS Security |
|
Extensions, or DNSSEC, hardens DNS. But learning DNSSEC requires |
|
wading through years of obsolete tutorials, dead ends, and |
|
inscrutable standards. Strengths and weaknesses of DNSSEC are |
|
discussed, some of which may explain why OpenBSD does not support the |
|
extended features by default. |
|
|
|
<br><a href="https://www.michaelwlucas.com/nonfiction/dnssec-mastery">The |
|
official DNSSEC Mastery website is here</a> |
|
|
|
<p> |
|
|
|
|
|
<dt><a name="book10"><i>Absolute OpenBSD. 2nd Edition!</i></a> |
<dt><a name="book10"><i>Absolute OpenBSD. 2nd Edition!</i></a> |
<dd>by Michael Lucas |
<dd>by Michael W. Lucas |
<dd>ISBN-13 978-1-59327-476-4 |
<dd>ISBN-13: 978-1-59327-476-4 |
<dd>April 2013, 536 pp. |
<dd>April 2013, 536 pp. |
<dd> |
<p> |
Michael Lucas brings us the long anticipated second edition of his |
Michael W. Lucas brings us the long anticipated second edition of his |
wildly successful book about using OpenBSD. This book covers all aspects of |
wildly successful book about using OpenBSD. This book covers all aspects of |
the OpenBSD system for new UNIX and BSD users alike.<br> |
the OpenBSD system for new UNIX and BSD users alike. |
|
The official Absolute OpenBSD 2nd edition website is |
<a href="https://www.michaelwlucas.com/nonfiction/absolute-openbsd-2nd-edition"> |
<a href="https://www.michaelwlucas.com/nonfiction/absolute-openbsd-2nd-edition"> |
The official Absolute OpenBSD 2nd edition website is here.</a>. |
here</a>. |
|
|
<p> |
<p> |
|
|
|
|
<dt><a name="book5"><i>OpenBSD 4.0: A Crash Course</i></a> (PDF) |
|
<dd>by Jem Matzan |
|
<dd>ISBN 0-596-51015-2 |
|
<dd>January 2007, 59 pp. |
|
<dd> |
|
Jem Matzan, known for his online articles promoting OpenBSD, |
|
is the author of this "Short Cut" guide to installing and administering |
|
OpenBSD 4.0. Topics include initial configuration, desktop and server, |
|
using ports (complete with extra hints on some ports), and maintenance. |
|
You order this book direct from O'Reilly, and it comes as a PDF |
|
with free download of corrected versions as they become available. |
|
<ul> |
|
</ul> |
|
<p>[<a href="http://www.oreilly.com/catalog/openbsd4/">Order from O'Reilly</a>] |
|
<p> |
|
|
|
|
|
<dt><a name="book3"> |
<dt><a name="book3"> |
<i>Secure Architectures with OpenBSD</i></a> |
<i>Secure Architectures with OpenBSD</i></a> |
<dd>by Brandon Palmer, Jose Nazario. |
<dd>by Brandon Palmer, Jose Nazario. |
<dd>ISBN 03-21193-66-0 |
<dd>ISBN 03-21193-66-0 |
<dd>April 2004, 520 pp. |
<dd>April 2004, 520 pp. |
<dd> |
<p> |
A guide for system and network administrators who need to move to a |
A guide for system and network administrators who need to move to a |
more secure operating system and a reference for seasoned OpenBSD users |
more secure operating system and a reference for seasoned OpenBSD users |
who want to fully exploit every feature of the system. This book |
who want to fully exploit every feature of the system. This book |
|
|
100% applicable, but probably the closest there is to an overall |
100% applicable, but probably the closest there is to an overall |
system internals manual for OpenBSD. |
system internals manual for OpenBSD. |
<p> |
<p> |
|
|
<dt> |
<dt> |
<i>Source Code Secrets: The Basic 386BSD Operating System Reference |
<i>Source Code Secrets: The Basic 386BSD Operating System Reference |
(Volume 1 of Operating System Source Code Secrets)</i> |
(Volume 1 of Operating System Source Code Secrets)</i> |
|
|
Not all of it applies to modern versions of OpenBSD, of course, but |
Not all of it applies to modern versions of OpenBSD, of course, but |
you can still learn a lot from it. |
you can still learn a lot from it. |
<p> |
<p> |
|
|
<dt> |
<dt> |
<i>Berkeley Unix: A Simple and Comprehensive Guide</i> |
<i>Berkeley Unix: A Simple and Comprehensive Guide</i> |
<dd>by James Wilson |
<dd>by James Wilson |
|
|
Begins with the basic commands and finishes with advanced programming |
Begins with the basic commands and finishes with advanced programming |
techniques. Offers strong coverage of systems calls. |
techniques. Offers strong coverage of systems calls. |
<p> |
<p> |
|
|
<dt> |
<dt> |
<i>An Introduction to Berkeley Unix and ANSI C</i> |
<i>An Introduction to Berkeley Unix and ANSI C</i> |
<dd>by Jack Hodges |
<dd>by Jack Hodges |
|
|
of programming; the correct use of syntax; programming style, debugging, logic, |
of programming; the correct use of syntax; programming style, debugging, logic, |
and system programming with C. |
and system programming with C. |
<p> |
<p> |
|
|
<dt> |
<dt> |
<dt> |
<dt> |
<i>4.4 BSD User's Reference Manual (URM)</i> |
<i>4.4 BSD User's Reference Manual (URM)</i> |
|
|
which are specific to OpenBSD, and more up-to-date. So |
which are specific to OpenBSD, and more up-to-date. So |
you don't need this one: use the <em>man</em> command instead. |
you don't need this one: use the <em>man</em> command instead. |
<p> |
<p> |
|
|
<dt> |
<dt> |
<dt> |
<dt> |
<i>4.4 BSD System Manager's Manual (SMM)</i> |
<i>4.4 BSD System Manager's Manual (SMM)</i> |
|
|
4.4BSD distributions. |
4.4BSD distributions. |
They are not included with OpenBSD. |
They are not included with OpenBSD. |
<p> |
<p> |
|
|
<dt> |
<dt> |
<dt> |
<dt> |
<i>BSD mit Methode</i> |
<i>BSD mit Methode</i> |
|
|
Lehmann's Online Bookshop</a>. However, you might want to pick up a <a |
Lehmann's Online Bookshop</a>. However, you might want to pick up a <a |
href="http://www.lob.de/cgi-bin/work/frameset?flag=jfl&frame=yes&id=38effe1813566">more |
href="http://www.lob.de/cgi-bin/work/frameset?flag=jfl&frame=yes&id=38effe1813566">more |
recent version of the CD-ROM</a>. |
recent version of the CD-ROM</a>. |
|
|
<p> |
<p> |
|
|
<dt> |
<dt> |
<dt> |
<dt> |
<i>The OpenBSD PF Packet Filter Book</i> |
<i>The OpenBSD PF Packet Filter Book</i> |
|
|
<dd>by John Muster |
<dd>by John Muster |
<dd>A general Unix book that covers all areas of the system. |
<dd>A general Unix book that covers all areas of the system. |
<p> |
<p> |
|
|
<dt><i>UNIX Power Tools</i> |
<dt><i>UNIX Power Tools</i> |
<dd>by Jerry D. Peek, Tim O'Reilly, and Mike Loukides |
<dd>by Jerry D. Peek, Tim O'Reilly, and Mike Loukides |
<dd> |
<dd> |
|
|
<a href="faq/ports/index.html">Ports Mechanism</a> |
<a href="faq/ports/index.html">Ports Mechanism</a> |
that is part of OpenBSD. |
that is part of OpenBSD. |
<p> |
<p> |
|
|
<dt><i><a href="http://www.rodsbooks.com/multiboot/">The Multi-Boot Configuration Handbook</a></i> |
<dt><i><a href="http://www.rodsbooks.com/multiboot/">The Multi-Boot Configuration Handbook</a></i> |
<dd>by Rod Smith |
<dd>by Rod Smith |
<dd> |
<dd> |
|
|
<dd> |
<dd> |
This is an excellent book on Unix system administration. |
This is an excellent book on Unix system administration. |
<p> |
<p> |
|
|
|
<dt><a name="book11"><i>Sudo Mastery</i></a> |
|
<dd>by Michael W. Lucas |
|
<dd>ISBN-13: 978-1493626205 |
|
<dd>ISBN-10: 1493626205 |
|
<dd>October 2013, 144pp. |
|
<dd>Access Control for Real People |
|
<p> |
|
Unix-like operating systems use a rudimentary access control system: |
|
the root account can do anything, while other users are peasants with |
|
only minimal access. This worked fine in UNIX's youth, but today, |
|
system administration responsibilities are spread among many people |
|
and applications. Different people may need different slices of |
|
root's power. However pros and cons are considered as well. |
|
This book also thoroughly covers sudo's extended features. |
|
The official Sudo Mastery website is |
|
<a href="https://www.michaelwlucas.com/nonfiction/sudo-mastery">here</a>. |
|
<p> |
|
|
<dt><i>Essential System Administration</i> |
<dt><i>Essential System Administration</i> |
<dd>by AEleen Frisch |
<dd>by Æleen Frisch |
<dd> |
<dd> |
This book covers many fundamental tasks in system administration. It includes |
This book covers many fundamental tasks in system administration. It includes |
examples for a wide range of Unix operating systems, including BSD. |
examples for a wide range of Unix operating systems, including BSD. |
|
|
This book leads its reader through all the low-level kernel models for |
This book leads its reader through all the low-level kernel models for |
multi-processing architectures. |
multi-processing architectures. |
<p> |
<p> |
|
|
<dt><i>Lions' Commentary on UNIX 6th Edition with Source Code</i> |
<dt><i>Lions' Commentary on UNIX 6th Edition with Source Code</i> |
<dd>by John Lions |
<dd>by John Lions |
<dd> |
<dd> |
|
|
to how a timesharing OS works, if you've not been inside one before. |
to how a timesharing OS works, if you've not been inside one before. |
Substantially shorter than the McKusick book above. |
Substantially shorter than the McKusick book above. |
<p> |
<p> |
|
|
<dt><i>The Practice of Programming</i> |
<dt><i>The Practice of Programming</i> |
<dd>by Brian W. Kernighan and Rob Pike |
<dd>by Brian W. Kernighan and Rob Pike |
<dd> |
<dd> |
|
|
This book covers practical programming considerations for C, C++ and Java. |
This book covers practical programming considerations for C, C++ and Java. |
Highly recommended. |
Highly recommended. |
<p> |
<p> |
|
|
<dt><i>The Elements of Programming Style</i> |
<dt><i>The Elements of Programming Style</i> |
<dd>by Brian W. Kernighan and P. J. Plauger |
<dd>by Brian W. Kernighan and P. J. Plauger |
<dd> |
<dd> |
This book is similar to <i>The Practice of Programming</i>, but older. The |
This book is similar to <i>The Practice of Programming</i>, but older. The |
examples are given in Fortran and PL/I. |
examples are given in Fortran and PL/I. |
<p> |
<p> |
|
|
<dt><i>Advanced Programming in the Unix Environment (2nd Edition)</i> |
<dt><i>Advanced Programming in the Unix Environment (2nd Edition)</i> |
<dd>by W. Richard Stevens, Stephen A. Rago |
<dd>by W. Richard Stevens, Stephen A. Rago |
<dd> |
<dd> |
|
|
This book along with the OpenBSD manual pages |
This book along with the OpenBSD manual pages |
make an excellent combination. |
make an excellent combination. |
<p> |
<p> |
|
|
<dt><i>The C Programming Language</i> |
<dt><i>The C Programming Language</i> |
<dd>by Brian W. Kernighan and Dennis M. Ritchie |
<dd>by Brian W. Kernighan and Dennis M. Ritchie |
<dd> |
<dd> |
|
|
perhaps the only one you will ever need. It focuses strictly on the C language, |
perhaps the only one you will ever need. It focuses strictly on the C language, |
not how to use your compiler or anything else. |
not how to use your compiler or anything else. |
<p> |
<p> |
|
|
<dt><i>C: A Reference Manual</i> |
<dt><i>C: A Reference Manual</i> |
<dd>by Samuel P. Harbison and Guy L. Steele |
<dd>by Samuel P. Harbison and Guy L. Steele |
<dd> |
<dd> |
|
|
This book is not a tutorial (hence the title), it deals with syntax, data types, |
This book is not a tutorial (hence the title), it deals with syntax, data types, |
ISO C library functions, and C/C++ compatibility. |
ISO C library functions, and C/C++ compatibility. |
<p> |
<p> |
|
|
<dt><i>The Art of Software Security Assessment</i> |
<dt><i>The Art of Software Security Assessment</i> |
<dd>by Mark Dowd, John McDonald and Justin Schuh |
<dd>by Mark Dowd, John McDonald and Justin Schuh |
<dd>Covers code auditing, design and operational review, types of |
<dd>Covers code auditing, design and operational review, types of |
|
|
Furthermore, this book is the first German book to cover VPN via OpenSSH. |
Furthermore, this book is the first German book to cover VPN via OpenSSH. |
<dd> |
<dd> |
<p> |
<p> |
|
|
|
<dt><a name="book12"><i>DNSSEC Mastery</i></a> |
|
<dd>by Michael W. Lucas |
|
<dd>ISBN-13: 978-1484924471 |
|
<dd>ISBN-10: 1484924479 |
|
<dd>May 2013, 130 pp. |
|
<dd>Securing the Domain Name System with BIND |
|
<p> |
|
DNS is one of the oldest protocols on the Internet, and was designed |
|
for a network without hostile users. Anyone who wants to break into a |
|
network starts by investigating the target's Domain Name Service. |
|
<p> |
|
In addition to providing a manual for BIND, this book thoroughly targets |
|
the extensions which are available in the port net/isc-bind. DNS Security |
|
Extensions, or DNSSEC, harden DNS. But learning DNSSEC requires |
|
wading through years of obsolete tutorials, dead ends, and |
|
inscrutable standards. Strengths and weaknesses of DNSSEC are |
|
discussed. |
|
<p> |
|
The official DNSSEC Mastery website is |
|
<a href="https://www.michaelwlucas.com/nonfiction/dnssec-mastery"> |
|
here</a>. |
|
<p> |
|
|
<dt><i>SSH, The Secure Shell.</i> |
<dt><i>SSH, The Secure Shell.</i> |
<dd>by Daniel J. Barrett and Richard Silverman |
<dd>by Daniel J. Barrett and Richard Silverman |
<dd>The Definitive Guide. OpenSSH is covered in detail. |
<dd>The Definitive Guide. OpenSSH is covered in detail. |
<p> |
<p> |
|
|
<dt><i>TCP/IP Illustrated, Volume 1</i> |
<dt><i>TCP/IP Illustrated, Volume 1</i> |
<dd>by W. Richard Stevens |
<dd>by W. Richard Stevens |
<dd> |
<dd> |
|
|
Home enthusiasts, developers, and network administrators alike will enjoy this |
Home enthusiasts, developers, and network administrators alike will enjoy this |
book. |
book. |
<p> |
<p> |
|
|
<dt><i>Kerberos: A Network Authentication System</i> |
<dt><i>Kerberos: A Network Authentication System</i> |
<dd>by Brian Tung |
<dd>by Brian Tung |
<dd> |
<dd> |
A guide for administrators of Kerberos-based networks. Explains concepts of |
A guide for administrators of Kerberos-based networks. Explains concepts of |
the Kerberos system, as well as the installation and administration of it. |
the Kerberos system, as well as the installation and administration of it. |
<p> |
<p> |
|
|
<dt><i>IPsec: The New Security Standard for the Internet, Intranets and Virtual |
<dt><i>IPsec: The New Security Standard for the Internet, Intranets and Virtual |
Private Networks</i> |
Private Networks</i> |
<dd>by Naganand Doraswamy and Dan Harkins |
<dd>by Naganand Doraswamy and Dan Harkins |
|
|
This book explains the IPsec protocol suite. It also describes its relation |
This book explains the IPsec protocol suite. It also describes its relation |
to the current deployments, such as VPNs, and future ideas. |
to the current deployments, such as VPNs, and future ideas. |
<p> |
<p> |
|
|
<dt><i>Computer Networks</i> |
<dt><i>Computer Networks</i> |
<dd>by Andy Tanenbaum |
<dd>by Andy Tanenbaum |
<dd> |
<dd> |
|
|
a wide range of protocols, concepts, and technologies. It covers technologies |
a wide range of protocols, concepts, and technologies. It covers technologies |
from fiber to wireless, LANs, Mobile IP, and a lot more. |
from fiber to wireless, LANs, Mobile IP, and a lot more. |
<p> |
<p> |
|
|
<dt><i>DNS and BIND</i> |
<dt><i>DNS and BIND</i> |
<dd>by Paul Albitz and Cricket Liu |
<dd>by Paul Albitz and Cricket Liu |
<dd> |
<dd> |
This book is an excellent introduction to DNS and BIND, useful for |
This book is an excellent introduction to DNS and BIND, useful for |
anyone who has to implement DNS under OpenBSD. |
anyone who has to implement DNS under OpenBSD. |
<p> |
<p> |
|
|
<dt><i>DHCP</i> |
<dt><i>DHCP</i> |
<dd>by Ted Lemon and Ralph E. Droms |
<dd>by Ted Lemon and Ralph E. Droms |
<dd> |
<dd> |
|
|
which is the organization that produces the DHCP client/server software |
which is the organization that produces the DHCP client/server software |
included with OpenBSD. |
included with OpenBSD. |
<p> |
<p> |
|
|
<dt><i>Managing NFS and NIS</i> |
<dt><i>Managing NFS and NIS</i> |
<dd>by Hal Stern |
<dd>by Hal Stern |
<dd> |
<dd> |
Gives essential information with examples on managing NFS and NIS. |
Gives essential information with examples on managing NFS and NIS. |
<p> |
<p> |
|
|
<dt><i>802.11 Security</i> |
<dt><i>802.11 Security</i> |
<dd>by Bruce Potter and Bob Fleck |
<dd>by Bruce Potter and Bob Fleck |
<dd> |
<dd> |
|
|
to understand the field. Also, it has a very extensive reference section. |
to understand the field. Also, it has a very extensive reference section. |
<br> |
<br> |
<p> |
<p> |
|
|
<dt><i>Handbook of Applied Cryptography</i> |
<dt><i>Handbook of Applied Cryptography</i> |
<dd>by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone |
<dd>by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone |
<dd>A new and detailed look at Cryptography. The authors write: |
<dd>A new and detailed look at Cryptography. The authors write: |
|
|
from the book authors' site, in PDF or PostScript. |
from the book authors' site, in PDF or PostScript. |
<dd> |
<dd> |
<p> |
<p> |
|
|
<dt><i>SSL and TLS Essentials: Securing the Web</i> |
<dt><i>SSL and TLS Essentials: Securing the Web</i> |
<dd>by Stephen A. Thomas |
<dd>by Stephen A. Thomas |
<dd> |
<dd> |
|
|
integrity and details the SSL protocol. |
integrity and details the SSL protocol. |
<dd> |
<dd> |
<p> |
<p> |
|
|
<dt><i>SSL and TLS: Designing and Building Secure Systems</i> |
<dt><i>SSL and TLS: Designing and Building Secure Systems</i> |
<dd>by Eric Rescorla |
<dd>by Eric Rescorla |
<dd> |
<dd> |
|
|
He has written several commercial and free SSL implementations. |
He has written several commercial and free SSL implementations. |
<dd> |
<dd> |
<p> |
<p> |
|
|
<dt><i>Big Book of IPsec RFCs: Internet Security Architecture</i> |
<dt><i>Big Book of IPsec RFCs: Internet Security Architecture</i> |
<dd>compiled by Pete Loshin |
<dd>compiled by Pete Loshin |
<dd> |
<dd> |