version 1.116, 2019/05/27 22:55:19 |
version 1.117, 2019/06/01 23:12:47 |
|
|
<dd>ISBN-13: 978-1-59327-589-1 |
<dd>ISBN-13: 978-1-59327-589-1 |
<dd>October 2014, 248 pp. |
<dd>October 2014, 248 pp. |
<p> |
<p> |
The first sentence of this book is "<i>This is a book about building the |
The first sentence of this book is "<i>This is a book about building the |
network you need.</i>" Taking it from there, Peter walks you through the whys |
network you need.</i>" Taking it from there, Peter walks you through the whys |
and the hows of building the high performance, low maintenance network you need, |
and the hows of building the high performance, low maintenance network you need, |
using OpenBSD tools. |
using OpenBSD tools. |
The book covers all bases, from the basic one machine configuration and basic |
The book covers all bases, from the basic one machine configuration and basic |
local area networks, all the way up to configurations with traffic shaping and |
local area networks, all the way up to configurations with traffic shaping and |
load balancing with "self-healing" networks and countermeasures against common |
load balancing with "self-healing" networks and countermeasures against common |
problems such as DoS attempts and spamming. A basic understanding of TCP/IP |
problems such as DoS attempts and spamming. A basic understanding of TCP/IP |
and some Unix knowledge is assumed. |
and some Unix knowledge is assumed. |
The official book website for a sample chapter, table of contents and errata |
The official book website for a sample chapter, table of contents and errata |
can be found <a href="https://nostarch.com/pf3">here</a>. |
can be found <a href="https://nostarch.com/pf3">here</a>. |
<p> |
<p> |
|
|
|
|
<dd>ISBN-13: 978-1-59327-476-4 |
<dd>ISBN-13: 978-1-59327-476-4 |
<dd>April 2013, 536 pp. |
<dd>April 2013, 536 pp. |
<p> |
<p> |
Michael W. Lucas brings us the long anticipated second edition of his |
Michael W. Lucas brings us the long anticipated second edition of his |
wildly successful book about using OpenBSD. This book covers all aspects of |
wildly successful book about using OpenBSD. This book covers all aspects of |
the OpenBSD system for new UNIX and BSD users alike. |
the OpenBSD system for new UNIX and BSD users alike. |
The official Absolute OpenBSD 2nd edition website is |
The official Absolute OpenBSD 2nd edition website is |
<a href="https://www.michaelwlucas.com/os/ao2e">here</a>. |
<a href="https://www.michaelwlucas.com/os/ao2e">here</a>. |
|
|
<dd>ISBN 03-21193-66-0 |
<dd>ISBN 03-21193-66-0 |
<dd>April 2004, 520 pp. |
<dd>April 2004, 520 pp. |
<p> |
<p> |
A guide for system and network administrators who need to move to a |
A guide for system and network administrators who need to move to a |
more secure operating system and a reference for seasoned OpenBSD users |
more secure operating system and a reference for seasoned OpenBSD users |
who want to fully exploit every feature of the system. This book |
who want to fully exploit every feature of the system. This book |
covers all aspects of OpenBSD, including systrace, Kerberos V, IPv6 and |
covers all aspects of OpenBSD, including systrace, Kerberos V, IPv6 and |
IPsec, and the development environment. |
IPsec, and the development environment. |
|
|
<i>The Design and Implementation of the 4.4BSD Operating System</i> |
<i>The Design and Implementation of the 4.4BSD Operating System</i> |
<dd>by Marshal Kirk McKusick, Keith Bostic, Michael J. Karels, John S. Quarterman |
<dd>by Marshal Kirk McKusick, Keith Bostic, Michael J. Karels, John S. Quarterman |
<dd>ISBN-10: 0132317923 |
<dd>ISBN-10: 0132317923 |
<dd>ISBN-13: 978-0132317924 |
<dd>ISBN-13: 978-0132317924 |
<dd> |
<dd> |
At 549 pages plus an index, this book must be considered comprehensive. |
At 549 pages plus an index, this book must be considered comprehensive. |
McKusick, Bostic and Karels are well known as prime movers at |
McKusick, Bostic and Karels are well known as prime movers at |
|
|
<i>4.4BSD User's Reference Manual (URM)</i> |
<i>4.4BSD User's Reference Manual (URM)</i> |
<dd>published by O'Reilly, 1994 |
<dd>published by O'Reilly, 1994 |
<dd> |
<dd> |
This is just a reprint of the man pages for users. |
This is just a reprint of the man pages for users. |
Your OpenBSD distribution includes the online man pages, |
Your OpenBSD distribution includes the online man pages, |
which are specific to OpenBSD, and more up to date. So |
which are specific to OpenBSD, and more up to date. So |
you don't need this one: use the <em>man</em> command instead. |
you don't need this one: use the <em>man</em> command instead. |
|
|
three freenix BSDs covering the essentials of installation, X configuration |
three freenix BSDs covering the essentials of installation, X configuration |
and system administration, as well as PERL programming and tips on |
and system administration, as well as PERL programming and tips on |
LaTeX/Lyx. The book also covers the KDE desktop environment. |
LaTeX/Lyx. The book also covers the KDE desktop environment. |
<br>Includes older versions of OpenBSD on the two included CD-ROMs. |
<br>Includes older versions of OpenBSD on the two included CD-ROMs. |
<br><a href="http://www.lob.de/isbn/9783932311314">Lehmann's Online Bookshop</a>. |
<br><a href="http://www.lob.de/isbn/9783932311314">Lehmann's Online Bookshop</a>. |
However, you might want to pick up a more recent version of the CD-ROM. |
However, you might want to pick up a more recent version of the CD-ROM. |
<p> |
<p> |
|
|
<dl> |
<dl> |
<dt><i>Unix Made Easy</i> |
<dt><i>Unix Made Easy</i> |
<dd>by John Muster |
<dd>by John Muster |
<dd>A general Unix book that covers all areas of the system. |
<dd>A general Unix book that covers all areas of the system. |
<p> |
<p> |
|
|
<dt><i>UNIX Power Tools</i> |
<dt><i>UNIX Power Tools</i> |
|
|
<dt><i>UNIX System Administration Handbook</i> |
<dt><i>UNIX System Administration Handbook</i> |
<dd>by Evi Nemeth, Garth Snyder, Scott Seebass, Trent R. Hein |
<dd>by Evi Nemeth, Garth Snyder, Scott Seebass, Trent R. Hein |
<dd> |
<dd> |
This is an excellent book on Unix system administration. |
This is an excellent book on Unix system administration. |
<p> |
<p> |
|
|
<dt id="book11"><i>Sudo Mastery</i> |
<dt id="book11"><i>Sudo Mastery</i> |
<dd>by Michael W. Lucas |
<dd>by Michael W. Lucas |
<dd>ISBN-13: 978-1493626205 |
<dd>ISBN-13: 978-1493626205 |
<dd>ISBN-10: 1493626205 |
<dd>ISBN-10: 1493626205 |
<dd>October 2013, 144pp. |
<dd>October 2013, 144pp. |
<dd>Access Control for Real People |
<dd>Access Control for Real People |
<p> |
<p> |
Unix-like operating systems use a rudimentary access control system: |
Unix-like operating systems use a rudimentary access control system: |
the root account can do anything, while other users are peasants with |
the root account can do anything, while other users are peasants with |
only minimal access. This worked fine in UNIX's youth, but today, |
only minimal access. This worked fine in UNIX's youth, but today, |
|
|
<dt><i>Unix Systems for Modern Architectures</i> |
<dt><i>Unix Systems for Modern Architectures</i> |
<dd>by Curt Schimmel |
<dd>by Curt Schimmel |
<dd> |
<dd> |
This book leads its reader through all the low-level kernel models for |
This book leads its reader through all the low-level kernel models for |
multi-processing architectures. |
multi-processing architectures. |
<p> |
<p> |
|
|
|
|
<dd>by Brian W. Kernighan and Rob Pike |
<dd>by Brian W. Kernighan and Rob Pike |
<dd> |
<dd> |
Brian Kernighan had a hand in two other books which we recommend even though they're not UNIX specific, but are useful to programmers on UNIX and elsewhere. |
Brian Kernighan had a hand in two other books which we recommend even though they're not UNIX specific, but are useful to programmers on UNIX and elsewhere. |
This book covers practical programming considerations for C, C++ and Java. |
This book covers practical programming considerations for C, C++ and Java. |
Highly recommended. |
Highly recommended. |
<p> |
<p> |
|
|
|
|
<dd>by Brian W. Kernighan and P. J. Plauger |
<dd>by Brian W. Kernighan and P. J. Plauger |
<dd> |
<dd> |
This book is similar to <i>The Practice of Programming</i>, but older. The |
This book is similar to <i>The Practice of Programming</i>, but older. The |
examples are given in Fortran and PL/I. |
examples are given in Fortran and PL/I. |
<p> |
<p> |
|
|
<dt><i>Advanced Programming in the Unix Environment (3rd Edition)</i> |
<dt><i>Advanced Programming in the Unix Environment (3rd Edition)</i> |
|
|
not how to use your compiler or anything else. |
not how to use your compiler or anything else. |
<p> |
<p> |
|
|
<dt><i>C: A Reference Manual</i> |
<dt><i>C: A Reference Manual</i> |
<dd>by Samuel P. Harbison and Guy L. Steele |
<dd>by Samuel P. Harbison and Guy L. Steele |
<dd> |
<dd> |
If you only had two books on C, then along with <i>The C Programming Language</i>, this would be your second one! |
If you only had two books on C, then along with <i>The C Programming Language</i>, this would be your second one! |
This book is not a tutorial (hence the title), it deals with syntax, data types, |
This book is not a tutorial (hence the title), it deals with syntax, data types, |
|
|
|
|
<dt><i>IPsec: The New Security Standard for the Internet, Intranets and Virtual |
<dt><i>IPsec: The New Security Standard for the Internet, Intranets and Virtual |
Private Networks</i> |
Private Networks</i> |
<dd>by Naganand Doraswamy and Dan Harkins |
<dd>by Naganand Doraswamy and Dan Harkins |
<dd> |
<dd> |
This book explains the IPsec protocol suite. It also describes its relation |
This book explains the IPsec protocol suite. It also describes its relation |
to the current deployments, such as VPNs, and future ideas. |
to the current deployments, such as VPNs, and future ideas. |
|
|
<dt><i>Managing NFS and NIS</i> |
<dt><i>Managing NFS and NIS</i> |
<dd>by Hal Stern |
<dd>by Hal Stern |
<dd> |
<dd> |
Gives essential information with examples on managing NFS and NIS. |
Gives essential information with examples on managing NFS and NIS. |
<p> |
<p> |
|
|
<dt><i>802.11 Security</i> |
<dt><i>802.11 Security</i> |
|
|
<p> |
<p> |
|
|
<dt><i>Handbook of Applied Cryptography</i> |
<dt><i>Handbook of Applied Cryptography</i> |
<dd>by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone |
<dd>by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone |
<dd>A new and detailed look at Cryptography. The authors write: |
<dd>A new and detailed look at Cryptography. The authors write: |
<dd> |
<dd> |
... Public-key cryptographic techniques |
... Public-key cryptographic techniques |
|
|
needs a wider scope of coverage within the area of cryptography. |
needs a wider scope of coverage within the area of cryptography. |
It is a necessary and timely guide for professionals who practice |
It is a necessary and timely guide for professionals who practice |
the art of cryptography. |
the art of cryptography. |
<dd>The entire book is |
<dd>The entire book is |
<a href="http://www.cacr.math.uwaterloo.ca/hac/"> |
<a href="http://www.cacr.math.uwaterloo.ca/hac/"> |
available for free downloading</a> (for personal use only) |
available for free downloading</a> (for personal use only) |
from the book authors' site, in PDF or PostScript. |
from the book authors' site, in PDF or PostScript. |