[BACK]Return to books.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/books.html between version 1.102 and 1.103

version 1.102, 2015/07/02 05:49:03 version 1.103, 2016/01/29 19:03:31
Line 2 
Line 2 
 <html>  <html>
 <head>  <head>
 <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">  <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
 <meta name="description" content="Books about BSD and OpenBSD">  <meta name="description" content="Books about OpenBSD and UNIX">
 <meta name="copyright" content="This document copyright 1998-2007 by OpenBSD.">  <meta name="copyright" content="This document copyright 1998-2016 by OpenBSD.">
 <meta name="generator" content="The vi editor from UNIX">  <meta name="generator" content="The vi editor from UNIX">
 <meta name="Author" content="Ian Darwin">  <meta name="Author" content="Ian Darwin">
 <title>The OpenBSD Bookstore</title>  <title>Books about OpenBSD and UNIX</title>
 <link rel="canonical" href="http://www.openbsd.org/books.html">  <link rel="canonical" href="http://www.openbsd.org/books.html">
 </head>  </head>
   
Line 15 
Line 15 
 <a href="index.html"><img alt="[OpenBSD]" height="30" width="141" border="0" src="images/smalltitle.gif"></a>  <a href="index.html"><img alt="[OpenBSD]" height="30" width="141" border="0" src="images/smalltitle.gif"></a>
 <p>  <p>
 <h2><font color="#cc0000">UNIX and BSD books</font></h2>  <h2><font color="#cc0000">UNIX and BSD books</font></h2>
   Note that the information in some older books may no longer be accurate
   or relevant to modern OpenBSD.
 <hr>  <hr>
   
 <h3>OpenBSD-specific books</h3>  <h3>OpenBSD-specific books</h3>
Line 26 
Line 28 
 <dd>ISBN-10: 1-59327-589-7  <dd>ISBN-10: 1-59327-589-7
 <dd>ISBN-13: 978-1-59327-589-1  <dd>ISBN-13: 978-1-59327-589-1
 <dd>Copyright 2015.  <dd>Copyright 2015.
 <dd>  
 The first sentence of this book is, "<i>This is a book about building the  
 network you need</i>". Taking it from there, Peter walks you through the whys  
 and the hows of building the high performance, low maintenance network you need,  
 using OpenBSD tools.<br>  
 The book covers all bases from the basic one machine configuration and basic  
 local area networks, all the way up to configurations with traffic shaping and  
 load balancing with "self healing" networks and countermeasures against common  
 problems such as DoS attempts and spamming.  A basic understanding of TCP/IP  
 and some Unix knowledge is assumed.<br>  
 The official book website for a sample chapter, table of contents and errata  
 can be found at  
 <a href="http://www.nostarch.com/pf3">http://www.nostarch.com/pf3</a>.  
 <p>  <p>
   The first sentence of this book is "<i>This is a book about building the
   network you need.</i>" Taking it from there, Peter walks you through the whys
 <dt><a name="book8"><i>The Book of PF, 2nd Edition<br>  
 A No-Nonsense Guide to the OpenBSD Firewall</i></a>  
 <dd>by Peter N. M. Hansteen  
 <dd>ISBN-13: 978-1-59327-274-6  
 <dd>November 2010.  
 <dd>  
 The first sentence of this book is, "<i>This is a book about building the  
 network you need</i>". Taking it from there, Peter walks you through the whys  
 and the hows of building the high performance, low maintenance network you need,  and the hows of building the high performance, low maintenance network you need,
 using OpenBSD tools.<br>  using OpenBSD tools.
 The book covers all bases from the basic one machine configuration and basic  The book covers all bases, from the basic one machine configuration and basic
 local area networks, all the way up to configurations with traffic shaping and  local area networks, all the way up to configurations with traffic shaping and
 load balancing with "self healing" networks and countermeasures against common  load balancing with "self-healing" networks and countermeasures against common
 problems such as DoS attempts and spamming.  A basic understanding of TCP/IP  problems such as DoS attempts and spamming.  A basic understanding of TCP/IP
 and some Unix knowledge is assumed.<br>  and some Unix knowledge is assumed.
 The official book website for a sample chapter, table of contents and errata  The official book website for a sample chapter, table of contents and errata
 can be found at  can be found <a href="http://www.nostarch.com/pf3">here</a>.
 <a href="http://www.nostarch.com/pf2.htm">http://www.nostarch.com/pf2.htm</a>.  
 <p>  <p>
   
   
 <dt><a name="book9"><i>SSH Mastery</i></a>  <dt><a name="book9"><i>SSH Mastery</i></a>
 <dd>by Michael Lucas  <dd>by Michael W. Lucas
 <dd>ISBN-13: 978-1470069711  <dd>ISBN-13: 978-1470069711
 <dd>ISBN-10: 1470069717  <dd>ISBN-10: 1470069717
 <dd>February 2012, 145 pp.  <dd>February 2012, 145 pp.
 <dd>OpenSSH, PuTTY, Tunnels, and Keys  <dd>OpenSSH, PuTTY, Tunnels, and Keys
 <dd>  <p>
   
 A guide to what you need to know about SSH. This book will help you  A guide to what you need to know about SSH. This book will help you
 eliminate passwords on your network, tunnel unencrypted protocols  eliminate passwords on your network, tunnel unencrypted protocols
 through secure channels, build VPNs with OpenSSH, and more. Focuses on  through secure channels, build VPNs with OpenSSH, and more. Focuses on
 the OpenSSH server, the OpenSSH client, and the PuTTY client.  the OpenSSH server, the OpenSSH client, and the PuTTY client.
 Michael W Lucas is the author of Absolute OpenBSD and other BSD books.  Michael W. Lucas is the author of <i>Absolute OpenBSD</i> and other BSD books.
 Helping support OpenBSD, Michael is contributing all his author's profits, from  The official SSH Mastery website is
 orders via the main OpenBSD order page, back to the project.  <a href="https://www.michaelwlucas.com/nonfiction/ssh-mastery">here</a>.
 <br><a href="https://www.michaelwlucas.com/nonfiction/ssh-mastery">The  
 official SSH Mastery website is here</a>  
   
 <p>  <p>
   
   
 <dt><a name="book11"><i>Sudo Mastery</i></a>  
 <dd>by Michael Lucas  
 <dd>ISBN-13: 978-1493626205  
 <dd>ISBN-10: 1493626205  
 <dd>October 2013, 144pp.  
 <dd>Access Control for Real People  
 <dd>  
   
 Unix-like operating systems use a rudimentary access control system:  
 the root account can do anything, while other users are peasants with  
 only minimal access. This worked fine in UNIX's youth, but today,  
 system administration responsibilities are spread among many people  
 and applications.  Different people may need different slices of  
 root's power. However pros and cons are considered as well.<p>  
   
 This book also thoroughly covers extended features used in other  
 operating systems, but not supported in OpenBSD's more minimalist  
 policy.  
   
 <br><a href="https://www.michaelwlucas.com/nonfiction/sudo-mastery">The  
 official Sudo Mastery website is here</a>  
   
 <p>  
   
   
   
 <dt><a name="book12"><i>DNSSEC Mastery</i></a>  
 <dd>by Michael Lucas  
 <dd>ISBN-13: 978-1484924471  
 <dd>ISBN-10: 1484924479  
 <dd>May 2013, 130 pp.  
 <dd>Securing the Domain Name System with Bind.  
 <dd>  
   
 DNS is one of the oldest protocols on the Internet, and was designed  
 for a network without hostile users. Anyone who wants to break into a  
 network starts by investigating the target's Domain Name Service. <p>  
   
 In addition to providing a manual for "bind", which is in OpenBSD's  
 default configuration, this book thoroughly targets the extensions  
 which are available in the port net/isc-bind.  DNS Security  
 Extensions, or DNSSEC, hardens DNS.  But learning DNSSEC requires  
 wading through years of obsolete tutorials, dead ends, and  
 inscrutable standards.  Strengths and weaknesses of DNSSEC are  
 discussed, some of which may explain why OpenBSD does not support the  
 extended features by default.  
   
 <br><a href="https://www.michaelwlucas.com/nonfiction/dnssec-mastery">The  
 official DNSSEC Mastery website is here</a>  
   
 <p>  
   
   
 <dt><a name="book10"><i>Absolute OpenBSD. 2nd Edition!</i></a>  <dt><a name="book10"><i>Absolute OpenBSD. 2nd Edition!</i></a>
 <dd>by Michael Lucas  <dd>by Michael W. Lucas
 <dd>ISBN-13  978-1-59327-476-4  <dd>ISBN-13: 978-1-59327-476-4
 <dd>April 2013, 536 pp.  <dd>April 2013, 536 pp.
 <dd>  <p>
 Michael Lucas brings us the long anticipated second edition of his  Michael W. Lucas brings us the long anticipated second edition of his
 wildly successful book about using OpenBSD.  This book covers all aspects of  wildly successful book about using OpenBSD.  This book covers all aspects of
 the OpenBSD system for new UNIX and BSD users alike.<br>  the OpenBSD system for new UNIX and BSD users alike.
   The official Absolute OpenBSD 2nd edition website is
 <a href="https://www.michaelwlucas.com/nonfiction/absolute-openbsd-2nd-edition">  <a href="https://www.michaelwlucas.com/nonfiction/absolute-openbsd-2nd-edition">
 The official Absolute OpenBSD 2nd edition website is here.</a>.  here</a>.
   
 <p>  <p>
   
   
 <dt><a name="book5"><i>OpenBSD 4.0: A Crash Course</i></a> (PDF)  
 <dd>by Jem Matzan  
 <dd>ISBN 0-596-51015-2  
 <dd>January 2007, 59 pp.  
 <dd>  
 Jem Matzan, known for his online articles promoting OpenBSD,  
 is the author of this "Short Cut" guide to installing and administering  
 OpenBSD 4.0. Topics include initial configuration, desktop and server,  
 using ports (complete with extra hints on some ports), and maintenance.  
 You order this book direct from O'Reilly, and it comes as a PDF  
 with free download of corrected versions as they become available.  
 <ul>  
 </ul>  
 <p>[<a href="http://www.oreilly.com/catalog/openbsd4/">Order from O'Reilly</a>]  
 <p>  
   
   
 <dt><a name="book3">  <dt><a name="book3">
 <i>Secure Architectures with OpenBSD</i></a>  <i>Secure Architectures with OpenBSD</i></a>
 <dd>by Brandon Palmer, Jose Nazario.  <dd>by Brandon Palmer, Jose Nazario.
 <dd>ISBN 03-21193-66-0  <dd>ISBN 03-21193-66-0
 <dd>April 2004, 520 pp.  <dd>April 2004, 520 pp.
 <dd>  <p>
 A guide for system and network administrators who need to move to a  A guide for system and network administrators who need to move to a
 more secure operating system and a reference for seasoned OpenBSD users  more secure operating system and a reference for seasoned OpenBSD users
 who want to fully exploit every feature of the system. This book  who want to fully exploit every feature of the system. This book
Line 197 
Line 99 
 100% applicable, but probably the closest there is to an overall  100% applicable, but probably the closest there is to an overall
 system internals manual for OpenBSD.  system internals manual for OpenBSD.
 <p>  <p>
   
 <dt>  <dt>
 <i>Source Code Secrets: The Basic 386BSD Operating System Reference  <i>Source Code Secrets: The Basic 386BSD Operating System Reference
 (Volume 1 of Operating System Source Code Secrets)</i>  (Volume 1 of Operating System Source Code Secrets)</i>
Line 210 
Line 113 
 Not all of it applies to modern versions of OpenBSD, of course, but  Not all of it applies to modern versions of OpenBSD, of course, but
 you can still learn a lot from it.  you can still learn a lot from it.
 <p>  <p>
   
 <dt>  <dt>
 <i>Berkeley Unix: A Simple and Comprehensive Guide</i>  <i>Berkeley Unix: A Simple and Comprehensive Guide</i>
 <dd>by James Wilson  <dd>by James Wilson
Line 217 
Line 121 
 Begins with the basic commands and finishes with advanced programming  Begins with the basic commands and finishes with advanced programming
 techniques. Offers strong coverage of systems calls.  techniques. Offers strong coverage of systems calls.
 <p>  <p>
   
 <dt>  <dt>
 <i>An Introduction to Berkeley Unix and ANSI C</i>  <i>An Introduction to Berkeley Unix and ANSI C</i>
 <dd>by Jack Hodges  <dd>by Jack Hodges
Line 226 
Line 131 
 of programming; the correct use of syntax; programming style, debugging, logic,  of programming; the correct use of syntax; programming style, debugging, logic,
 and system programming with C.  and system programming with C.
 <p>  <p>
   
 <dt>  <dt>
 <dt>  <dt>
 <i>4.4 BSD User's Reference Manual (URM)</i>  <i>4.4 BSD User's Reference Manual (URM)</i>
Line 236 
Line 142 
 which are specific to OpenBSD, and more up-to-date. So  which are specific to OpenBSD, and more up-to-date. So
 you don't need this one: use the <em>man</em> command instead.  you don't need this one: use the <em>man</em> command instead.
 <p>  <p>
   
 <dt>  <dt>
 <dt>  <dt>
 <i>4.4 BSD System Manager's Manual (SMM)</i>  <i>4.4 BSD System Manager's Manual (SMM)</i>
Line 249 
Line 156 
 4.4BSD distributions.  4.4BSD distributions.
 They are not included with OpenBSD.  They are not included with OpenBSD.
 <p>  <p>
   
 <dt>  <dt>
 <dt>  <dt>
 <i>BSD mit Methode</i>  <i>BSD mit Methode</i>
Line 263 
Line 171 
 Lehmann's Online Bookshop</a>. However, you might want to pick up a <a  Lehmann's Online Bookshop</a>. However, you might want to pick up a <a
 href="http://www.lob.de/cgi-bin/work/frameset?flag=jfl&amp;frame=yes&amp;id=38effe1813566">more  href="http://www.lob.de/cgi-bin/work/frameset?flag=jfl&amp;frame=yes&amp;id=38effe1813566">more
 recent version of the CD-ROM</a>.  recent version of the CD-ROM</a>.
   
 <p>  <p>
   
 <dt>  <dt>
 <dt>  <dt>
 <i>The OpenBSD PF Packet Filter Book</i>  <i>The OpenBSD PF Packet Filter Book</i>
Line 289 
Line 197 
 <dd>by John Muster  <dd>by John Muster
 <dd>A general Unix book that covers all areas of the system.  <dd>A general Unix book that covers all areas of the system.
 <p>  <p>
   
 <dt><i>UNIX Power Tools</i>  <dt><i>UNIX Power Tools</i>
 <dd>by Jerry D. Peek, Tim O'Reilly, and Mike Loukides  <dd>by Jerry D. Peek, Tim O'Reilly, and Mike Loukides
 <dd>  <dd>
Line 301 
Line 210 
 <a href="faq/ports/index.html">Ports Mechanism</a>  <a href="faq/ports/index.html">Ports Mechanism</a>
 that is part of OpenBSD.  that is part of OpenBSD.
 <p>  <p>
   
 <dt><i><a href="http://www.rodsbooks.com/multiboot/">The Multi-Boot Configuration Handbook</a></i>  <dt><i><a href="http://www.rodsbooks.com/multiboot/">The Multi-Boot Configuration Handbook</a></i>
 <dd>by Rod Smith  <dd>by Rod Smith
 <dd>  <dd>
Line 316 
Line 226 
 <dd>  <dd>
 This is an excellent book on Unix system administration.  This is an excellent book on Unix system administration.
 <p>  <p>
   
   <dt><a name="book11"><i>Sudo Mastery</i></a>
   <dd>by Michael W. Lucas
   <dd>ISBN-13: 978-1493626205
   <dd>ISBN-10: 1493626205
   <dd>October 2013, 144pp.
   <dd>Access Control for Real People
   <p>
   Unix-like operating systems use a rudimentary access control system:
   the root account can do anything, while other users are peasants with
   only minimal access. This worked fine in UNIX's youth, but today,
   system administration responsibilities are spread among many people
   and applications.  Different people may need different slices of
   root's power. However pros and cons are considered as well.
   This book also thoroughly covers sudo's extended features.
   The official Sudo Mastery website is
   <a href="https://www.michaelwlucas.com/nonfiction/sudo-mastery">here</a>.
   <p>
   
 <dt><i>Essential System Administration</i>  <dt><i>Essential System Administration</i>
 <dd>by AEleen Frisch  <dd>by &AElig;leen Frisch
 <dd>  <dd>
 This book covers many fundamental tasks in system administration.  It includes  This book covers many fundamental tasks in system administration.  It includes
 examples for a wide range of Unix operating systems, including BSD.  examples for a wide range of Unix operating systems, including BSD.
Line 332 
Line 261 
 This book leads its reader through all the low-level kernel models for  This book leads its reader through all the low-level kernel models for
 multi-processing architectures.  multi-processing architectures.
 <p>  <p>
   
 <dt><i>Lions' Commentary on UNIX 6th Edition with Source Code</i>  <dt><i>Lions' Commentary on UNIX 6th Edition with Source Code</i>
 <dd>by John Lions  <dd>by John Lions
 <dd>  <dd>
Line 344 
Line 274 
 to how a timesharing OS works, if you've not been inside one before.  to how a timesharing OS works, if you've not been inside one before.
 Substantially shorter than the McKusick book above.  Substantially shorter than the McKusick book above.
 <p>  <p>
   
 <dt><i>The Practice of Programming</i>  <dt><i>The Practice of Programming</i>
 <dd>by Brian W. Kernighan and Rob Pike  <dd>by Brian W. Kernighan and Rob Pike
 <dd>  <dd>
Line 351 
Line 282 
 This book covers practical programming considerations for C, C++ and Java.  This book covers practical programming considerations for C, C++ and Java.
 Highly recommended.  Highly recommended.
 <p>  <p>
   
 <dt><i>The Elements of Programming Style</i>  <dt><i>The Elements of Programming Style</i>
 <dd>by Brian W. Kernighan and P. J. Plauger  <dd>by Brian W. Kernighan and P. J. Plauger
 <dd>  <dd>
 This book is similar to <i>The Practice of Programming</i>, but older.  The  This book is similar to <i>The Practice of Programming</i>, but older.  The
 examples are given in Fortran and PL/I.  examples are given in Fortran and PL/I.
 <p>  <p>
   
 <dt><i>Advanced Programming in the Unix Environment (2nd Edition)</i>  <dt><i>Advanced Programming in the Unix Environment (2nd Edition)</i>
 <dd>by W. Richard Stevens, Stephen A. Rago  <dd>by W. Richard Stevens, Stephen A. Rago
 <dd>  <dd>
Line 366 
Line 299 
 This book along with the OpenBSD manual pages  This book along with the OpenBSD manual pages
 make an excellent combination.  make an excellent combination.
 <p>  <p>
   
 <dt><i>The C Programming Language</i>  <dt><i>The C Programming Language</i>
 <dd>by Brian W. Kernighan and Dennis M. Ritchie  <dd>by Brian W. Kernighan and Dennis M. Ritchie
 <dd>  <dd>
Line 373 
Line 307 
 perhaps the only one you will ever need.  It focuses strictly on the C language,  perhaps the only one you will ever need.  It focuses strictly on the C language,
 not how to use your compiler or anything else.  not how to use your compiler or anything else.
 <p>  <p>
   
 <dt><i>C: A Reference Manual</i>  <dt><i>C: A Reference Manual</i>
 <dd>by Samuel P. Harbison and Guy L. Steele  <dd>by Samuel P. Harbison and Guy L. Steele
 <dd>  <dd>
Line 380 
Line 315 
 This book is not a tutorial (hence the title), it deals with syntax, data types,  This book is not a tutorial (hence the title), it deals with syntax, data types,
 ISO C library functions, and C/C++ compatibility.  ISO C library functions, and C/C++ compatibility.
 <p>  <p>
   
 <dt><i>The Art of Software Security Assessment</i>  <dt><i>The Art of Software Security Assessment</i>
 <dd>by Mark Dowd, John McDonald and Justin Schuh  <dd>by Mark Dowd, John McDonald and Justin Schuh
 <dd>Covers code auditing, design and operational review, types of  <dd>Covers code auditing, design and operational review, types of
Line 406 
Line 342 
 Furthermore, this book is the first German book to cover VPN via OpenSSH.  Furthermore, this book is the first German book to cover VPN via OpenSSH.
 <dd>  <dd>
 <p>  <p>
   
   <dt><a name="book12"><i>DNSSEC Mastery</i></a>
   <dd>by Michael W. Lucas
   <dd>ISBN-13: 978-1484924471
   <dd>ISBN-10: 1484924479
   <dd>May 2013, 130 pp.
   <dd>Securing the Domain Name System with BIND
   <p>
   DNS is one of the oldest protocols on the Internet, and was designed
   for a network without hostile users. Anyone who wants to break into a
   network starts by investigating the target's Domain Name Service.
   <p>
   In addition to providing a manual for BIND, this book thoroughly targets
   the extensions which are available in the port net/isc-bind. DNS Security
   Extensions, or DNSSEC, harden DNS.  But learning DNSSEC requires
   wading through years of obsolete tutorials, dead ends, and
   inscrutable standards.  Strengths and weaknesses of DNSSEC are
   discussed.
   <p>
   The official DNSSEC Mastery website is
   <a href="https://www.michaelwlucas.com/nonfiction/dnssec-mastery">
   here</a>.
   <p>
   
 <dt><i>SSH, The Secure Shell.</i>  <dt><i>SSH, The Secure Shell.</i>
 <dd>by Daniel J. Barrett and Richard Silverman  <dd>by Daniel J. Barrett and Richard Silverman
 <dd>The Definitive Guide.  OpenSSH is covered in detail.  <dd>The Definitive Guide.  OpenSSH is covered in detail.
 <p>  <p>
   
 <dt><i>TCP/IP Illustrated, Volume 1</i>  <dt><i>TCP/IP Illustrated, Volume 1</i>
 <dd>by W. Richard Stevens  <dd>by W. Richard Stevens
 <dd>  <dd>
Line 419 
Line 380 
 Home enthusiasts, developers, and network administrators alike will enjoy this  Home enthusiasts, developers, and network administrators alike will enjoy this
 book.  book.
 <p>  <p>
   
 <dt><i>Kerberos: A Network Authentication System</i>  <dt><i>Kerberos: A Network Authentication System</i>
 <dd>by Brian Tung  <dd>by Brian Tung
 <dd>  <dd>
 A guide for administrators of Kerberos-based networks.  Explains concepts of  A guide for administrators of Kerberos-based networks.  Explains concepts of
 the Kerberos system, as well as the installation and administration of it.  the Kerberos system, as well as the installation and administration of it.
 <p>  <p>
   
 <dt><i>IPsec: The New Security Standard for the Internet, Intranets and Virtual  <dt><i>IPsec: The New Security Standard for the Internet, Intranets and Virtual
 Private Networks</i>  Private Networks</i>
 <dd>by Naganand Doraswamy and Dan Harkins  <dd>by Naganand Doraswamy and Dan Harkins
Line 432 
Line 395 
 This book explains the IPsec protocol suite.  It also describes its relation  This book explains the IPsec protocol suite.  It also describes its relation
 to the current deployments, such as VPNs, and future ideas.  to the current deployments, such as VPNs, and future ideas.
 <p>  <p>
   
 <dt><i>Computer Networks</i>  <dt><i>Computer Networks</i>
 <dd>by Andy Tanenbaum  <dd>by Andy Tanenbaum
 <dd>  <dd>
Line 439 
Line 403 
 a wide range of protocols, concepts, and technologies.  It covers technologies  a wide range of protocols, concepts, and technologies.  It covers technologies
 from fiber to wireless, LANs, Mobile IP, and a lot more.  from fiber to wireless, LANs, Mobile IP, and a lot more.
 <p>  <p>
   
 <dt><i>DNS and BIND</i>  <dt><i>DNS and BIND</i>
 <dd>by Paul Albitz and Cricket Liu  <dd>by Paul Albitz and Cricket Liu
 <dd>  <dd>
 This book is an excellent introduction to DNS and BIND, useful for  This book is an excellent introduction to DNS and BIND, useful for
 anyone who has to implement DNS under OpenBSD.  anyone who has to implement DNS under OpenBSD.
 <p>  <p>
   
 <dt><i>DHCP</i>  <dt><i>DHCP</i>
 <dd>by Ted Lemon and Ralph E. Droms  <dd>by Ted Lemon and Ralph E. Droms
 <dd>  <dd>
Line 452 
Line 418 
 which is the organization that produces the DHCP client/server software  which is the organization that produces the DHCP client/server software
 included with OpenBSD.  included with OpenBSD.
 <p>  <p>
   
 <dt><i>Managing NFS and NIS</i>  <dt><i>Managing NFS and NIS</i>
 <dd>by Hal Stern  <dd>by Hal Stern
 <dd>  <dd>
 Gives essential information with examples on managing NFS and NIS.  Gives essential information with examples on managing NFS and NIS.
 <p>  <p>
   
 <dt><i>802.11 Security</i>  <dt><i>802.11 Security</i>
 <dd>by Bruce Potter and Bob Fleck  <dd>by Bruce Potter and Bob Fleck
 <dd>  <dd>
Line 478 
Line 446 
 to understand the field.  Also, it has a very extensive reference section.  to understand the field.  Also, it has a very extensive reference section.
 <br>  <br>
 <p>  <p>
   
 <dt><i>Handbook of Applied Cryptography</i>  <dt><i>Handbook of Applied Cryptography</i>
 <dd>by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone  <dd>by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone
 <dd>A new and detailed look at Cryptography.  The authors write:  <dd>A new and detailed look at Cryptography.  The authors write:
Line 496 
Line 465 
 from the book authors' site, in PDF or PostScript.  from the book authors' site, in PDF or PostScript.
 <dd>  <dd>
 <p>  <p>
   
 <dt><i>SSL and TLS Essentials: Securing the Web</i>  <dt><i>SSL and TLS Essentials: Securing the Web</i>
 <dd>by Stephen A. Thomas  <dd>by Stephen A. Thomas
 <dd>  <dd>
Line 506 
Line 476 
 integrity and details the SSL protocol.  integrity and details the SSL protocol.
 <dd>  <dd>
 <p>  <p>
   
 <dt><i>SSL and TLS: Designing and Building Secure Systems</i>  <dt><i>SSL and TLS: Designing and Building Secure Systems</i>
 <dd>by Eric Rescorla  <dd>by Eric Rescorla
 <dd>  <dd>
Line 518 
Line 489 
 He has written several commercial and free SSL implementations.  He has written several commercial and free SSL implementations.
 <dd>  <dd>
 <p>  <p>
   
 <dt><i>Big Book of IPsec RFCs: Internet Security Architecture</i>  <dt><i>Big Book of IPsec RFCs: Internet Security Architecture</i>
 <dd>compiled by Pete Loshin  <dd>compiled by Pete Loshin
 <dd>  <dd>

Legend:
Removed from v.1.102  
changed lines
  Added in v.1.103