[BACK]Return to books.html CVS log [TXT][DIR] Up to [local] / www

Annotation of www/books.html, Revision 1.101

1.36      jufi        1: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
1.13      deraadt     2: <html>
                      3: <head>
1.36      jufi        4: <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
1.13      deraadt     5: <meta name="resource-type" content="document">
                      6: <meta name="description" content="Books about BSD and OpenBSD">
                      7: <meta name="keywords" content="openbsd,books,information">
                      8: <meta name="distribution" content="global">
1.66      jsg         9: <meta name="copyright" content="This document copyright 1998-2007 by OpenBSD.">
1.15      philen     10: <meta name="generator" content="The vi editor from UNIX">
                     11: <meta name="Author" content="Ian Darwin">
1.13      deraadt    12: <title>The OpenBSD Bookstore</title>
1.100     sthen      13: <link rel="canonical" href="http://www.openbsd.org/books.html">
1.13      deraadt    14: </head>
                     15:
1.57      grunk      16: <body text="#000000" bgcolor="#ffffff">
1.15      philen     17:
1.36      jufi       18: <a href="index.html"><img alt="[OpenBSD]" height="30" width="141" border="0" src="images/smalltitle.gif"></a>
1.13      deraadt    19: <p>
1.36      jufi       20: <h2><font color="#cc0000">UNIX and BSD books</font></h2>
                     21: <hr>
1.1       ian        22:
1.91      deraadt    23: <h3>OpenBSD-specific books</h3>
1.15      philen     24: <dl>
1.89      austin     25:
1.97      austin     26: <dt><a name="book13"><i>The Book of PF, 3rd Edition<br>
                     27: A No-Nonsense Guide to the OpenBSD Firewall</i></a>
                     28: <dd>by Peter N. M. Hansteen
                     29: <dd>ISBN-10: 1-59327-589-7
                     30: <dd>ISBN-13: 978-1-59327-589-1
                     31: <dd>Copyright 2015.
                     32: <dd>
                     33: The first sentence of this book is, "<i>This is a book about building the
                     34: network you need</i>". Taking it from there, Peter walks you through the whys
                     35: and the hows of building the high performance, low maintenance network you need,
                     36: using OpenBSD tools.<br>
                     37: The book covers all bases from the basic one machine configuration and basic
                     38: local area networks, all the way up to configurations with traffic shaping and
                     39: load balancing with "self healing" networks and countermeasures against common
                     40: problems such as DoS attempts and spamming.  A basic understanding of TCP/IP
                     41: and some Unix knowledge is assumed.<br>
                     42: The official book website for a sample chapter, table of contents and errata
                     43: can be found at
1.98      austin     44: <a href="http://www.nostarch.com/pf3">http://www.nostarch.com/pf3</a>.
1.97      austin     45: <p>
                     46:
                     47:
1.81      deraadt    48: <dt><a name="book8"><i>The Book of PF, 2nd Edition<br>
                     49: A No-Nonsense Guide to the OpenBSD Firewall</i></a>
                     50: <dd>by Peter N. M. Hansteen
                     51: <dd>ISBN-13: 978-1-59327-274-6
                     52: <dd>November 2010.
                     53: <dd>
1.72      wvdputte   54: The first sentence of this book is, "<i>This is a book about building the
                     55: network you need</i>". Taking it from there, Peter walks you through the whys
                     56: and the hows of building the high performance, low maintenance network you need,
                     57: using OpenBSD tools.<br>
                     58: The book covers all bases from the basic one machine configuration and basic
                     59: local area networks, all the way up to configurations with traffic shaping and
                     60: load balancing with "self healing" networks and countermeasures against common
1.73      wvdputte   61: problems such as DoS attempts and spamming.  A basic understanding of TCP/IP
1.72      wvdputte   62: and some Unix knowledge is assumed.<br>
                     63: The official book website for a sample chapter, table of contents and errata
1.75      tobias     64: can be found at
1.89      austin     65: <a href="http://www.nostarch.com/pf2.htm">http://www.nostarch.com/pf2.htm</a>.
1.93      austin     66: <p>
1.89      austin     67:
                     68:
1.87      austin     69: <dt><a name="book9"><i>SSH Mastery</i></a>
                     70: <dd>by Michael Lucas
                     71: <dd>ISBN-13: 978-1470069711
                     72: <dd>ISBN-10: 1470069717
                     73: <dd>February 2012, 145 pp.
1.93      austin     74: <dd>OpenSSH, PuTTY, Tunnels, and Keys
1.87      austin     75: <dd>
1.93      austin     76:
1.87      austin     77: A guide to what you need to know about SSH. This book will help you
                     78: eliminate passwords on your network, tunnel unencrypted protocols
                     79: through secure channels, build VPNs with OpenSSH, and more. Focuses on
                     80: the OpenSSH server, the OpenSSH client, and the PuTTY client.
                     81: Michael W Lucas is the author of Absolute OpenBSD and other BSD books.
                     82: Helping support OpenBSD, Michael is contributing all his author's profits, from
1.93      austin     83: orders via the main OpenBSD order page, back to the project.
                     84: <br><a href="https://www.michaelwlucas.com/nonfiction/ssh-mastery">The
1.92      deraadt    85: official SSH Mastery website is here</a>
1.93      austin     86:
                     87: <p>
                     88:
                     89:
                     90: <dt><a name="book11"><i>Sudo Mastery</i></a>
                     91: <dd>by Michael Lucas
                     92: <dd>ISBN-13: 978-1493626205
                     93: <dd>ISBN-10: 1493626205
                     94: <dd>October 2013, 144pp.
                     95: <dd>Access Control for Real People
                     96: <dd>
                     97:
                     98: Unix-like operating systems use a rudimentary access control system:
                     99: the root account can do anything, while other users are peasants with
                    100: only minimal access. This worked fine in UNIX's youth, but today,
                    101: system administration responsibilities are spread among many people
                    102: and applications.  Different people may need different slices of
                    103: root's power. However pros and cons are considered as well.<p>
                    104:
                    105: This book also thoroughly covers extended features used in other
                    106: operating systems, but not supported in OpenBSD's more minimalist
                    107: policy.
                    108:
                    109: <br><a href="https://www.michaelwlucas.com/nonfiction/sudo-mastery">The
                    110: official Sudo Mastery website is here</a>
                    111:
                    112: <p>
                    113:
                    114:
                    115:
                    116: <dt><a name="book12"><i>DNSSEC Mastery</i></a>
                    117: <dd>by Michael Lucas
                    118: <dd>ISBN-13: 978-1484924471
                    119: <dd>ISBN-10: 1484924479
                    120: <dd>May 2013, 130 pp.
                    121: <dd>Securing the Domain Name System with Bind.
                    122: <dd>
                    123:
                    124: DNS is one of the oldest protocols on the Internet, and was designed
                    125: for a network without hostile users. Anyone who wants to break into a
                    126: network starts by investigating the target's Domain Name Service. <p>
                    127:
                    128: In addition to providing a manual for "bind", which is in OpenBSD's
                    129: default configuration, this book thoroughly targets the extensions
                    130: which are available in the port net/isc-bind.  DNS Security
                    131: Extensions, or DNSSEC, hardens DNS.  But learning DNSSEC requires
                    132: wading through years of obsolete tutorials, dead ends, and
                    133: inscrutable standards.  Strengths and weaknesses of DNSSEC are
                    134: discussed, some of which may explain why OpenBSD does not support the
                    135: extended features by default.
                    136:
                    137: <br><a href="https://www.michaelwlucas.com/nonfiction/dnssec-mastery">The
                    138: official DNSSEC Mastery website is here</a>
                    139:
1.87      austin    140: <p>
                    141:
                    142:
1.89      austin    143: <dt><a name="book10"><i>Absolute OpenBSD. 2nd Edition!</i></a>
1.41      jose      144: <dd>by Michael Lucas
1.89      austin    145: <dd>ISBN-13  978-1-59327-476-4
1.94      deraadt   146: <dd>April 2013, 536 pp.
1.41      jose      147: <dd>
1.90      deraadt   148: Michael Lucas brings us the long anticipated second edition of his
1.93      austin    149: wildly successful book about using OpenBSD.  This book covers all aspects of
                    150: the OpenBSD system for new UNIX and BSD users alike.<br>
1.89      austin    151:
                    152: <a href="https://www.michaelwlucas.com/nonfiction/absolute-openbsd-2nd-edition">
                    153: The official Absolute OpenBSD 2nd edition website is here.</a>.
1.93      austin    154:
                    155: <p>
                    156:
1.42      wvdputte  157:
1.65      ian       158: <dt><a name="book5"><i>OpenBSD 4.0: A Crash Course</i></a> (PDF)
                    159: <dd>by Jem Matzan
                    160: <dd>ISBN 0-596-51015-2
                    161: <dd>January 2007, 59 pp.
                    162: <dd>
                    163: Jem Matzan, known for his online articles promoting OpenBSD,
                    164: is the author of this "Short Cut" guide to installing and administering
                    165: OpenBSD 4.0. Topics include initial configuration, desktop and server,
                    166: using ports (complete with extra hints on some ports), and maintenance.
                    167: You order this book direct from O'Reilly, and it comes as a PDF
                    168: with free download of corrected versions as they become available.
                    169: <ul>
                    170: </ul>
1.93      austin    171: <p>[<a href="http://www.oreilly.com/catalog/openbsd4/">Order from O'Reilly</a>]
                    172: <p>
                    173:
1.65      ian       174:
1.48      austin    175: <dt><a name="book3">
                    176: <i>Secure Architectures with OpenBSD</i></a>
1.47      jose      177: <dd>by Brandon Palmer, Jose Nazario.
                    178: <dd>ISBN 03-21193-66-0
                    179: <dd>April 2004, 520 pp.
                    180: <dd>
                    181: A guide for system and network administrators who need to move to a
                    182: more secure operating system and a reference for seasoned OpenBSD users
                    183: who want to fully exploit every feature of the system. This book
                    184: covers all aspects of OpenBSD, including systrace, Kerberos V, IPv6 and
                    185: IPsec, and the development environment.
1.15      philen    186: </dl>
                    187: <hr>
                    188:
1.91      deraadt   189: <h3>BSD-specific books</h3>
1.15      philen    190: <dl>
                    191: <dt>
                    192: <i>The Design and Implementation of the 4.4 BSD Operating System</i>
                    193: <dd>by Marshal Kirk McKusick, Keith Bostic, Michael J. Karels, John S. Quarterman
                    194: <dd>
1.52      millert   195: At 549 pages plus an index, <a href="http://www.awprofessional.com/title/0201549794">this book</a> must be considered comprehensive.
1.15      philen    196: McKusick, Bostic and Karels are well known as prime movers at
                    197: Berkeley CSRG (Computer Systems Research Group) during the 4.3/4.4BSD
                    198: period. This book covers the 4.4 and 4.4-Lite releases, and discusses
                    199: everything you wanted to know about how the system operates.  Not
                    200: 100% applicable, but probably the closest there is to an overall
                    201: system internals manual for OpenBSD.
1.13      deraadt   202: <p>
1.15      philen    203: <dt>
                    204: <i>Source Code Secrets: The Basic 386BSD Operating System Reference
                    205: (Volume 1 of Operating System Source Code Secrets)</i>
                    206: <dd>by L. W. Jolitz, William Jolitz; 1997
                    207: <dd>
                    208: The Jolitzes built the first port of BSD to the PC-386 architecture,
                    209: and deserve a lot of credit for making BSD portable to this low-cost
                    210: architecture. The earliest versions, called "386bsd", were described
1.46      david     211: in articles in <em>Dr. Dobbs Journal</em>. This book goes beyond the articles,
1.15      philen    212: and provides a comprehensive annotated collection of source code.
                    213: Not all of it applies to modern versions of OpenBSD, of course, but
                    214: you can still learn a lot from it.
1.13      deraadt   215: <p>
1.15      philen    216: <dt>
                    217: <i>Berkeley Unix: A Simple and Comprehensive Guide</i>
                    218: <dd>by James Wilson
                    219: <dd>
                    220: Begins with the basic commands and finishes with advanced programming
                    221: techniques. Offers strong coverage of systems calls.
                    222: <p>
                    223: <dt>
                    224: <i>An Introduction to Berkeley Unix and ANSI C</i>
                    225: <dd>by Jack Hodges
                    226: <dd>
                    227: An introduction to the operating system and the programming language.  Intended
                    228: for self-study, requires no previous knowledge of Unix.  Covers the fundamentals
                    229: of programming; the correct use of syntax; programming style, debugging, logic,
                    230: and system programming with C.
                    231: <p>
                    232: <dt>
                    233: <dt>
                    234: <i>4.4 BSD User's Reference Manual (URM)</i>
                    235: <dd>published by O'Reilly, 1994
                    236: <dd>
1.12      ian       237: This is just a reprint of the man pages for users.
1.2       ian       238: Your OpenBSD distribution includes the online man pages,
                    239: which are specific to OpenBSD, and more up-to-date. So
1.13      deraadt   240: you don't need this one: use the <em>man</em> command instead.
                    241: <p>
1.15      philen    242: <dt>
                    243: <dt>
                    244: <i>4.4 BSD System Manager's Manual (SMM)</i>
                    245: <dd>published by O'Reilly, 1994
                    246: <dd>
                    247: This book details what you need to know to run a BSD system.
1.2       ian       248: Quite a bit of this material is relevant to OpenBSD.
                    249: Unfortunately it is currently out of print.
1.13      deraadt   250: Worse, due to licensing restrictions from AT&amp;T,
                    251: the electronic editions of these were not included in the
1.86      lum       252: 4.4BSD distributions.
                    253: They are not included with OpenBSD.
1.17      louis     254: <p>
                    255: <dt>
                    256: <dt>
                    257: <i>BSD mit Methode</i>
1.23      horacio   258: <dd>published by C&amp;L Computer- und Literaturverlag GmbH, 1998
1.17      louis     259: <dd>
1.78      deraadt   260: A book in German on all
1.17      louis     261: three freenix BSDs covering the essentials of installation, X configuration
                    262: and system administration, as well as PERL programming and tips on
                    263: LaTeX/Lyx. The book also covers the KDE desktop environment.
                    264: <br>Includes older versions of OpenBSD on the two included CD-ROMs.
1.85      deraadt   265: <br><a href="http://www.lob.de/cgi-bin/work/frameset?flag=jfl&amp;frame=yes&amp;id=38effe1813566">
                    266: Lehmann's Online Bookshop</a>. However, you might want to pick up a <a
1.36      jufi      267: href="http://www.lob.de/cgi-bin/work/frameset?flag=jfl&amp;frame=yes&amp;id=38effe1813566">more
1.17      louis     268: recent version of the CD-ROM</a>.
1.61      grunk     269:
                    270: <p>
                    271: <dt>
                    272: <dt>
                    273: <i>The OpenBSD PF Packet Filter Book</i>
                    274: <dd>
                    275: published by Reed Media Services
                    276: <dd>
                    277: August 2006, 193 pp.
                    278: <dd>
1.62      steven    279: This book is an expanded, cross-referenced, indexed, edited, and reformatted
                    280: version of the <a href="faq/pf/index.html">PF User's Guide</a>.
1.61      grunk     281: It also covers spamd and introduces the setup and differences of PF
                    282: on NetBSD, DragonFly, and FreeBSD.
                    283: <br />The official book website with table of contents, index, and
                    284: configuration examples can be found at
                    285: <a href="http://www.reedmedia.net/books/pf-book/">http://www.reedmedia.net/books/pf-book/</a>.
1.15      philen    286: </dl>
                    287: <hr>
1.2       ian       288:
1.91      deraadt   289: <h3>Unix user guides</h3>
1.15      philen    290: <dl>
                    291: <dt><i>Unix Made Easy</i>
                    292: <dd>by John Muster
                    293: <dd>A general Unix book that covers all areas of the system.
                    294: <p>
                    295: <dt><i>UNIX Power Tools</i>
                    296: <dd>by Jerry D. Peek, Tim O'Reilly, and Mike Loukides
                    297: <dd>
1.58      grunk     298: This book is now in its third edition. It discusses
1.15      philen    299: hundreds of neat tricks, little-known techniques, and add-on utilities.
                    300: Be aware that many of the utilities are either included with OpenBSD
                    301: or, more commonly, are already available as ports or packages.
                    302: So most of section 52.03, complaining about how hard it is to port
                    303: software to different UNIXes, can be disregarded if you learn about the
1.80      steven    304: <a href="faq/ports/index.html">Ports Mechanism</a>
1.15      philen    305: that is part of OpenBSD.
1.18      ericj     306: <p>
                    307: <dt><i><a href="http://www.rodsbooks.com/multiboot/">The Multi-Boot Configuration Handbook</a></i>
                    308: <dd>by Rod Smith
                    309: <dd>
                    310: <dd>
                    311: Book explaining techniques for Multi-booting.
1.15      philen    312: </dl>
                    313: <hr>
1.1       ian       314:
1.91      deraadt   315: <h3>Unix administration</h3>
1.15      philen    316: <dl>
                    317: <dt><i>UNIX System Administration Handbook</i>
                    318: <dd>by Evi Nemeth, Garth Snyder, Scott Seebass, Trent R. Hein
                    319: <dd>
                    320: This is an excellent book on Unix system administration.
                    321: <p>
                    322: <dt><i>Essential System Administration</i>
                    323: <dd>by AEleen Frisch
                    324: <dd>
                    325: This book covers many fundamental tasks in system administration.  It includes
                    326: examples for a wide range of Unix operating systems, including BSD.
                    327: </dl>
                    328: <hr>
1.1       ian       329:
1.91      deraadt   330: <h3>Unix programming</h3>
1.15      philen    331: <dl>
                    332: <dt><i>Unix Systems for Modern Architectures</i>
                    333: <dd>by Curt Schimmel
                    334: <dd>
1.24      ian       335: This book leads its reader through all the low-level kernel models for
1.53      jsg       336: multi-processing architectures.
1.15      philen    337: <p>
                    338: <dt><i>Lions' Commentary on UNIX 6th Edition with Source Code</i>
                    339: <dd>by John Lions
                    340: <dd>
1.2       ian       341: Although the UNIX described in this book is to BSD as a Model T Ford
1.1       ian       342: is to a 70's Mustang or Thunderbird, UNIX inventor Ken Thompson
                    343: claims that "After 20 years, this is still the best exposition
                    344: of the workings of a 'real' operating system." Originally circulated
                    345: in illicit photocopies, this is the book that most first- and second-generation
                    346: UNIX hackers cut their code-teeth on. Recommended as a good introduction
                    347: to how a timesharing OS works, if you've not been inside one before.
                    348: Substantially shorter than the McKusick book above.
1.15      philen    349: <p>
                    350: <dt><i>The Practice of Programming</i>
                    351: <dd>by Brian W. Kernighan and Rob Pike
                    352: <dd>
                    353: Brian Kernighan had a hand in two other books which we recommend even though they're not UNIX specific, but are useful to programmers on UNIX and elsewhere.
                    354: This book covers practical programming considerations for C, C++ and Java.
                    355: Highly recommended.
1.46      david     356: <p>
1.15      philen    357: <dt><i>The Elements of Programming Style</i>
                    358: <dd>by Brian W. Kernighan and P. J. Plauger
                    359: <dd>
                    360: This book is similar to <i>The Practice of Programming</i>, but older.  The
                    361: examples are given in Fortran and PL/I.
1.16      chris     362: <p>
1.60      grunk     363: <dt><i>Advanced Programming in the Unix Environment (2nd Edition)</i>
                    364: <dd>by W. Richard Stevens, Stephen A. Rago
1.16      chris     365: <dd>
                    366: This is a very detailed and easy to read book.  It has several examples
                    367: that you can learn from.  There is plenty of information about library and
                    368: system calls, and associated information so that you can use them.
                    369: This book along with the OpenBSD manual pages
                    370: make an excellent combination.
1.36      jufi      371: <p>
1.25      chris     372: <dt><i>The C Programming Language</i>
                    373: <dd>by Brian W. Kernighan and Dennis M. Ritchie
                    374: <dd>
                    375: This is a clear and concise guide to the C programming language,
                    376: perhaps the only one you will ever need.  It focuses strictly on the C language,
                    377: not how to use your compiler or anything else.
1.36      jufi      378: <p>
1.46      david     379: <dt><i>C: A Reference Manual</i>
1.25      chris     380: <dd>by Samuel P. Harbison and Guy L. Steele
                    381: <dd>
1.46      david     382: If you only had two books on C, then along with <i>The C Programming Language</i>, this would be your second one!
1.25      chris     383: This book is not a tutorial (hence the title), it deals with syntax, data types,
                    384: ISO C library functions, and C/C++ compatibility.
1.36      jufi      385: <p>
1.64      steven    386: <dt><i>The Art of Software Security Assessment</i>
1.63      otto      387: <dd>by Mark Dowd, John McDonald and Justin Schuh
                    388: <dd>Covers code auditing, design and operational review, types of
                    389: vulnerabilities, privilege models, signals,
                    390: interprocess communication, synchronization, networking and more.
                    391: Lots of examples and real world code snippets.
1.15      philen    392: </dl>
1.25      chris     393:
1.15      philen    394: <hr>
                    395:
1.91      deraadt   396: <h3>Network administration</h3>
1.15      philen    397: <dl>
1.68      grunk     398: <dt><i><a name="book6" href="http://www.sshbuch.de/">Das SSH-Buch</a></i>
                    399: (German)
1.67      grunk     400: <dd>by Timo Dotzauer and Tobias L&uuml;tticke
                    401: <dd>ISBN 3-938626-03-8
                    402: <dd>Millin Verlag, December 2006, 600p.
                    403: <dd>This book covers the theory behind OpenSSH (protocol, channels, standards
                    404: documents) as well as using OpenSSH as an end user.
                    405: Although using Linux as a reference OS, many of the examples also have
                    406: a description how to get things done under BSD.
                    407: In a separate cookbook chapter, several scenarios from daily work are solved
                    408: using OpenSSH.
                    409: Furthermore, this book is the first German book to cover VPN via OpenSSH.
1.77      deraadt   410: <dd>
1.67      grunk     411: <p>
1.22      aaron     412: <dt><i>SSH, The Secure Shell.</i>
                    413: <dd>by Daniel J. Barrett and Richard Silverman
                    414: <dd>The Definitive Guide.  OpenSSH is covered in detail.
                    415: <p>
1.15      philen    416: <dt><i>TCP/IP Illustrated, Volume 1</i>
                    417: <dd>by W. Richard Stevens
                    418: <dd>
                    419: "Network administration" is really an inappropriate heading for this book.  It
                    420: is an encyclopedia of the TCP/IP protocol suite.  This book provides information,
1.35      pvalchev  421: and diagrams useful to understand the suite to its lowest level.
1.15      philen    422: Home enthusiasts, developers, and network administrators alike will enjoy this
                    423: book.
                    424: <p>
1.20      chris     425: <dt><i>Kerberos: A Network Authentication System</i>
                    426: <dd>by Brian Tung
                    427: <dd>
                    428: A guide for administrators of Kerberos-based networks.  Explains concepts of
                    429: the Kerberos system, as well as the installation and administration of it.
                    430: <p>
1.34      miod      431: <dt><i>IPsec: The New Security Standard for the Internet, Intranets and Virtual
1.20      chris     432: Private Networks</i>
                    433: <dd>by Naganand Doraswamy and Dan Harkins
                    434: <dd>
1.34      miod      435: This book explains the IPsec protocol suite.  It also describes its relation
1.20      chris     436: to the current deployments, such as VPNs, and future ideas.
1.36      jufi      437: <p>
1.20      chris     438: <dt><i>Computer Networks</i>
                    439: <dd>by Andy Tanenbaum
                    440: <dd>
                    441: This book is an high-level guide to modern computer networking.  It presents
                    442: a wide range of protocols, concepts, and technologies.  It covers technologies
                    443: from fiber to wireless, LANs, Mobile IP, and a lot more.
1.36      jufi      444: <p>
1.15      philen    445: <dt><i>DNS and BIND</i>
                    446: <dd>by Paul Albitz and Cricket Liu
                    447: <dd>
                    448: This book is an excellent introduction to DNS and BIND, useful for
                    449: anyone who has to implement DNS under OpenBSD.
                    450: <p>
                    451: <dt><i>DHCP</i>
                    452: <dd>by Ted Lemon and Ralph E. Droms
                    453: <dd>
1.46      david     454: Recommended by the <a href="http://www.isc.org/">Internet Software Consortium</a>,
1.15      philen    455: which is the organization that produces the DHCP client/server software
                    456: included with OpenBSD.
                    457: <p>
                    458: <dt><i>Managing NFS and NIS</i>
                    459: <dd>by Hal Stern
                    460: <dd>
                    461: Gives essential information with examples on managing NFS and NIS.
1.37      dhartmei  462: <p>
                    463: <dt><i>802.11 Security</i>
                    464: <dd>by Bruce Potter and Bob Fleck
                    465: <dd>
                    466: Provides information on the fundamentals of wireless security, including
                    467: practical solutions for setting up clients, access points and gateways
                    468: under several operating systems. Two chapters are dedicated to OpenBSD 3.1,
                    469: covering wi, bridge, pf and altq.
1.25      chris     470: </dl>
1.21      chris     471:
1.25      chris     472: <hr>
1.91      deraadt   473: <h3>Cryptography</h3>
1.21      chris     474: <dl>
                    475: <dt><i>Applied Cryptography: Protocols, Algorithms, and Source Code in C</i>
                    476: <dd>by Bruce Schneier
                    477: <dd>
                    478: A comprehensive explanation of Cryptography, with information
                    479: about its history, protocols, and algorithms.  This book is a great
                    480: introduction to cryptography, with the necessary basics
                    481: to understand the field.  Also, it has a very extensive reference section.
1.36      jufi      482: <br>
                    483: <p>
1.30      jsyn      484: <dt><i>Handbook of Applied Cryptography</i>
1.26      ian       485: <dd>by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone
                    486: <dd>A new and detailed look at Cryptography.  The authors write:
                    487: <dd>
                    488: ...  Public-key cryptographic techniques
                    489: are now in widespread use, especially in the financial services
                    490: industry, in the public sector, and by individuals for their personal
                    491: privacy, such as in electronic mail. This Handbook will serve as a
                    492: valuable reference for the novice as well as for the expert who
                    493: needs a wider scope of coverage within the area of cryptography.
                    494: It is a necessary and timely guide for professionals who practice
                    495: the art of cryptography.
                    496: <dd>The entire book is
1.55      grunk     497: <a href="http://www.cacr.math.uwaterloo.ca/hac/">
1.26      ian       498: available for free downloading</a> (for personal use only)
                    499: from the book authors' site, in PDF or PostScript.
                    500: <dd>
                    501: <p>
1.25      chris     502: <dt><i>SSL and TLS Essentials: Securing the Web</i>
                    503: <dd>by Stephen A. Thomas
                    504: <dd>
                    505: This book offers introductory coverage of the SSL and TLS protocols, with
                    506: examples.  The SSL protocol
                    507: is currently the basis of secure data transfer and secure transactions
                    508: on the Internet.  Aside from encryption, this book also covers data
                    509: integrity and details the SSL protocol.
                    510: <dd>
                    511: <p>
1.39      jose      512: <dt><i>SSL and TLS: Designing and Building Secure Systems</i>
                    513: <dd>by Eric Rescorla
                    514: <dd>
                    515: This book offers comprehensive information about the SSL and TLS protocols,
                    516: covering their operation and security,
                    517: together with usage and implementation details.
                    518: There are also chapters about HTTP over SSL, and SMTP over TLS (STARTTLS).
                    519: Eric Rescorla is the author of <tt>ssldump</tt>, a utility that can be
                    520: used to monitor SSL connections.
                    521: He has written several commercial and free SSL implementations.
                    522: <dd>
                    523: <p>
1.25      chris     524: <dt><i>Big Book of IPsec RFCs: Internet Security Architecture</i>
                    525: <dd>compiled by Pete Loshin
                    526: <dd>
1.54      nick      527: A complete reprint of the IPsec RFCs with an extensive index and
                    528: glossary.
1.25      chris     529: <dd>
1.15      philen    530: </dl>
1.13      deraadt   531:
                    532: </body>
                    533: </html>