[BACK]Return to books.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/books.html between version 1.116 and 1.117

version 1.116, 2019/05/27 22:55:19 version 1.117, 2019/06/01 23:12:47
Line 56 
Line 56 
 <dd>ISBN-13: 978-1-59327-589-1  <dd>ISBN-13: 978-1-59327-589-1
 <dd>October 2014, 248 pp.  <dd>October 2014, 248 pp.
 <p>  <p>
 The first sentence of this book is "<i>This is a book about building the  The first sentence of this book is "<i>This is a book about building the
 network you need.</i>" Taking it from there, Peter walks you through the whys  network you need.</i>" Taking it from there, Peter walks you through the whys
 and the hows of building the high performance, low maintenance network you need,  and the hows of building the high performance, low maintenance network you need,
 using OpenBSD tools.  using OpenBSD tools.
 The book covers all bases, from the basic one machine configuration and basic  The book covers all bases, from the basic one machine configuration and basic
 local area networks, all the way up to configurations with traffic shaping and  local area networks, all the way up to configurations with traffic shaping and
 load balancing with "self-healing" networks and countermeasures against common  load balancing with "self-healing" networks and countermeasures against common
 problems such as DoS attempts and spamming.  A basic understanding of TCP/IP  problems such as DoS attempts and spamming.  A basic understanding of TCP/IP
 and some Unix knowledge is assumed.  and some Unix knowledge is assumed.
 The official book website for a sample chapter, table of contents and errata  The official book website for a sample chapter, table of contents and errata
 can be found <a href="https://nostarch.com/pf3">here</a>.  can be found <a href="https://nostarch.com/pf3">here</a>.
 <p>  <p>
   
Line 91 
Line 91 
 <dd>ISBN-13: 978-1-59327-476-4  <dd>ISBN-13: 978-1-59327-476-4
 <dd>April 2013, 536 pp.  <dd>April 2013, 536 pp.
 <p>  <p>
 Michael W. Lucas brings us the long anticipated second edition of his  Michael W. Lucas brings us the long anticipated second edition of his
 wildly successful book about using OpenBSD.  This book covers all aspects of  wildly successful book about using OpenBSD.  This book covers all aspects of
 the OpenBSD system for new UNIX and BSD users alike.  the OpenBSD system for new UNIX and BSD users alike.
 The official Absolute OpenBSD 2nd edition website is  The official Absolute OpenBSD 2nd edition website is
 <a href="https://www.michaelwlucas.com/os/ao2e">here</a>.  <a href="https://www.michaelwlucas.com/os/ao2e">here</a>.
Line 104 
Line 104 
 <dd>ISBN 03-21193-66-0  <dd>ISBN 03-21193-66-0
 <dd>April 2004, 520 pp.  <dd>April 2004, 520 pp.
 <p>  <p>
 A guide for system and network administrators who need to move to a  A guide for system and network administrators who need to move to a
 more secure operating system and a reference for seasoned OpenBSD users  more secure operating system and a reference for seasoned OpenBSD users
 who want to fully exploit every feature of the system. This book  who want to fully exploit every feature of the system. This book
 covers all aspects of OpenBSD, including systrace, Kerberos V, IPv6 and  covers all aspects of OpenBSD, including systrace, Kerberos V, IPv6 and
 IPsec, and the development environment.  IPsec, and the development environment.
Line 118 
Line 118 
 <i>The Design and Implementation of the 4.4BSD Operating System</i>  <i>The Design and Implementation of the 4.4BSD Operating System</i>
 <dd>by Marshal Kirk McKusick, Keith Bostic, Michael J. Karels, John S. Quarterman  <dd>by Marshal Kirk McKusick, Keith Bostic, Michael J. Karels, John S. Quarterman
 <dd>ISBN-10: 0132317923  <dd>ISBN-10: 0132317923
 <dd>ISBN-13: 978-0132317924  <dd>ISBN-13: 978-0132317924
 <dd>  <dd>
 At 549 pages plus an index, this book must be considered comprehensive.  At 549 pages plus an index, this book must be considered comprehensive.
 McKusick, Bostic and Karels are well known as prime movers at  McKusick, Bostic and Karels are well known as prime movers at
Line 166 
Line 166 
 <i>4.4BSD User's Reference Manual (URM)</i>  <i>4.4BSD User's Reference Manual (URM)</i>
 <dd>published by O'Reilly, 1994  <dd>published by O'Reilly, 1994
 <dd>  <dd>
 This is just a reprint of the man pages for users.  This is just a reprint of the man pages for users.
 Your OpenBSD distribution includes the online man pages,  Your OpenBSD distribution includes the online man pages,
 which are specific to OpenBSD, and more up to date. So  which are specific to OpenBSD, and more up to date. So
 you don't need this one: use the <em>man</em> command instead.  you don't need this one: use the <em>man</em> command instead.
Line 195 
Line 195 
 three freenix BSDs covering the essentials of installation, X configuration  three freenix BSDs covering the essentials of installation, X configuration
 and system administration, as well as PERL programming and tips on  and system administration, as well as PERL programming and tips on
 LaTeX/Lyx. The book also covers the KDE desktop environment.  LaTeX/Lyx. The book also covers the KDE desktop environment.
 <br>Includes older versions of OpenBSD on the two included CD-ROMs.  <br>Includes older versions of OpenBSD on the two included CD-ROMs.
 <br><a href="http://www.lob.de/isbn/9783932311314">Lehmann's Online Bookshop</a>.  <br><a href="http://www.lob.de/isbn/9783932311314">Lehmann's Online Bookshop</a>.
 However, you might want to pick up a more recent version of the CD-ROM.  However, you might want to pick up a more recent version of the CD-ROM.
 <p>  <p>
Line 222 
Line 222 
 <dl>  <dl>
 <dt><i>Unix Made Easy</i>  <dt><i>Unix Made Easy</i>
 <dd>by John Muster  <dd>by John Muster
 <dd>A general Unix book that covers all areas of the system.  <dd>A general Unix book that covers all areas of the system.
 <p>  <p>
   
 <dt><i>UNIX Power Tools</i>  <dt><i>UNIX Power Tools</i>
Line 251 
Line 251 
 <dt><i>UNIX System Administration Handbook</i>  <dt><i>UNIX System Administration Handbook</i>
 <dd>by Evi Nemeth, Garth Snyder, Scott Seebass, Trent R. Hein  <dd>by Evi Nemeth, Garth Snyder, Scott Seebass, Trent R. Hein
 <dd>  <dd>
 This is an excellent book on Unix system administration.  This is an excellent book on Unix system administration.
 <p>  <p>
   
 <dt id="book11"><i>Sudo Mastery</i>  <dt id="book11"><i>Sudo Mastery</i>
 <dd>by Michael W. Lucas  <dd>by Michael W. Lucas
 <dd>ISBN-13: 978-1493626205  <dd>ISBN-13: 978-1493626205
 <dd>ISBN-10: 1493626205  <dd>ISBN-10: 1493626205
 <dd>October 2013, 144pp.  <dd>October 2013, 144pp.
 <dd>Access Control for Real People  <dd>Access Control for Real People
 <p>  <p>
 Unix-like operating systems use a rudimentary access control system:  Unix-like operating systems use a rudimentary access control system:
 the root account can do anything, while other users are peasants with  the root account can do anything, while other users are peasants with
 only minimal access. This worked fine in UNIX's youth, but today,  only minimal access. This worked fine in UNIX's youth, but today,
Line 285 
Line 285 
 <dt><i>Unix Systems for Modern Architectures</i>  <dt><i>Unix Systems for Modern Architectures</i>
 <dd>by Curt Schimmel  <dd>by Curt Schimmel
 <dd>  <dd>
 This book leads its reader through all the low-level kernel models for  This book leads its reader through all the low-level kernel models for
 multi-processing architectures.  multi-processing architectures.
 <p>  <p>
   
Line 306 
Line 306 
 <dd>by Brian W. Kernighan and Rob Pike  <dd>by Brian W. Kernighan and Rob Pike
 <dd>  <dd>
 Brian Kernighan had a hand in two other books which we recommend even though they're not UNIX specific, but are useful to programmers on UNIX and elsewhere.  Brian Kernighan had a hand in two other books which we recommend even though they're not UNIX specific, but are useful to programmers on UNIX and elsewhere.
 This book covers practical programming considerations for C, C++ and Java.  This book covers practical programming considerations for C, C++ and Java.
 Highly recommended.  Highly recommended.
 <p>  <p>
   
Line 314 
Line 314 
 <dd>by Brian W. Kernighan and P. J. Plauger  <dd>by Brian W. Kernighan and P. J. Plauger
 <dd>  <dd>
 This book is similar to <i>The Practice of Programming</i>, but older.  The  This book is similar to <i>The Practice of Programming</i>, but older.  The
 examples are given in Fortran and PL/I.  examples are given in Fortran and PL/I.
 <p>  <p>
   
 <dt><i>Advanced Programming in the Unix Environment (3rd Edition)</i>  <dt><i>Advanced Programming in the Unix Environment (3rd Edition)</i>
Line 335 
Line 335 
 not how to use your compiler or anything else.  not how to use your compiler or anything else.
 <p>  <p>
   
 <dt><i>C: A Reference Manual</i>  <dt><i>C: A Reference Manual</i>
 <dd>by Samuel P. Harbison and Guy L. Steele  <dd>by Samuel P. Harbison and Guy L. Steele
 <dd>  <dd>
 If you only had two books on C, then along with <i>The C Programming Language</i>, this would be your second one!  If you only had two books on C, then along with <i>The C Programming Language</i>, this would be your second one!
 This book is not a tutorial (hence the title), it deals with syntax, data types,  This book is not a tutorial (hence the title), it deals with syntax, data types,
Line 417 
Line 417 
   
 <dt><i>IPsec: The New Security Standard for the Internet, Intranets and Virtual  <dt><i>IPsec: The New Security Standard for the Internet, Intranets and Virtual
 Private Networks</i>  Private Networks</i>
 <dd>by Naganand Doraswamy and Dan Harkins  <dd>by Naganand Doraswamy and Dan Harkins
 <dd>  <dd>
 This book explains the IPsec protocol suite.  It also describes its relation  This book explains the IPsec protocol suite.  It also describes its relation
 to the current deployments, such as VPNs, and future ideas.  to the current deployments, such as VPNs, and future ideas.
Line 449 
Line 449 
 <dt><i>Managing NFS and NIS</i>  <dt><i>Managing NFS and NIS</i>
 <dd>by Hal Stern  <dd>by Hal Stern
 <dd>  <dd>
 Gives essential information with examples on managing NFS and NIS.  Gives essential information with examples on managing NFS and NIS.
 <p>  <p>
   
 <dt><i>802.11 Security</i>  <dt><i>802.11 Security</i>
Line 475 
Line 475 
 <p>  <p>
   
 <dt><i>Handbook of Applied Cryptography</i>  <dt><i>Handbook of Applied Cryptography</i>
 <dd>by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone  <dd>by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone
 <dd>A new and detailed look at Cryptography.  The authors write:  <dd>A new and detailed look at Cryptography.  The authors write:
 <dd>  <dd>
 ...  Public-key cryptographic techniques  ...  Public-key cryptographic techniques
Line 486 
Line 486 
 needs a wider scope of coverage within the area of cryptography.  needs a wider scope of coverage within the area of cryptography.
 It is a necessary and timely guide for professionals who practice  It is a necessary and timely guide for professionals who practice
 the art of cryptography.  the art of cryptography.
 <dd>The entire book is  <dd>The entire book is
 <a href="http://www.cacr.math.uwaterloo.ca/hac/">  <a href="http://www.cacr.math.uwaterloo.ca/hac/">
 available for free downloading</a> (for personal use only)  available for free downloading</a> (for personal use only)
 from the book authors' site, in PDF or PostScript.  from the book authors' site, in PDF or PostScript.

Legend:
Removed from v.1.116  
changed lines
  Added in v.1.117