Annotation of www/books.html, Revision 1.104
1.36 jufi 1: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
1.13 deraadt 2: <html>
3: <head>
1.36 jufi 4: <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
1.103 tj 5: <meta name="description" content="Books about OpenBSD and UNIX">
6: <meta name="copyright" content="This document copyright 1998-2016 by OpenBSD.">
1.15 philen 7: <meta name="generator" content="The vi editor from UNIX">
8: <meta name="Author" content="Ian Darwin">
1.104 ! tb 9: <meta name="viewport" content="width=device-width, initial-scale=1">
! 10: <link rel="stylesheet" type="text/css" href="openbsd.css">
1.103 tj 11: <title>Books about OpenBSD and UNIX</title>
1.100 sthen 12: <link rel="canonical" href="http://www.openbsd.org/books.html">
1.13 deraadt 13: </head>
14:
1.57 grunk 15: <body text="#000000" bgcolor="#ffffff">
1.15 philen 16:
1.104 ! tb 17: <h2>
! 18: <a href="../index.html">
! 19: <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>
! 20: <font color="#e00000">Books</font>
! 21: </h2>
! 22: <hr>
1.13 deraadt 23: <p>
1.104 ! tb 24:
1.103 tj 25: Note that the information in some older books may no longer be accurate
26: or relevant to modern OpenBSD.
1.36 jufi 27: <hr>
1.1 ian 28:
1.91 deraadt 29: <h3>OpenBSD-specific books</h3>
1.15 philen 30: <dl>
1.89 austin 31:
1.97 austin 32: <dt><a name="book13"><i>The Book of PF, 3rd Edition<br>
33: A No-Nonsense Guide to the OpenBSD Firewall</i></a>
34: <dd>by Peter N. M. Hansteen
35: <dd>ISBN-10: 1-59327-589-7
36: <dd>ISBN-13: 978-1-59327-589-1
37: <dd>Copyright 2015.
38: <p>
1.103 tj 39: The first sentence of this book is "<i>This is a book about building the
40: network you need.</i>" Taking it from there, Peter walks you through the whys
1.72 wvdputte 41: and the hows of building the high performance, low maintenance network you need,
1.103 tj 42: using OpenBSD tools.
43: The book covers all bases, from the basic one machine configuration and basic
1.72 wvdputte 44: local area networks, all the way up to configurations with traffic shaping and
1.103 tj 45: load balancing with "self-healing" networks and countermeasures against common
1.73 wvdputte 46: problems such as DoS attempts and spamming. A basic understanding of TCP/IP
1.103 tj 47: and some Unix knowledge is assumed.
1.72 wvdputte 48: The official book website for a sample chapter, table of contents and errata
1.103 tj 49: can be found <a href="http://www.nostarch.com/pf3">here</a>.
1.93 austin 50: <p>
1.89 austin 51:
1.87 austin 52: <dt><a name="book9"><i>SSH Mastery</i></a>
1.103 tj 53: <dd>by Michael W. Lucas
1.87 austin 54: <dd>ISBN-13: 978-1470069711
55: <dd>ISBN-10: 1470069717
56: <dd>February 2012, 145 pp.
1.93 austin 57: <dd>OpenSSH, PuTTY, Tunnels, and Keys
1.103 tj 58: <p>
1.87 austin 59: A guide to what you need to know about SSH. This book will help you
60: eliminate passwords on your network, tunnel unencrypted protocols
61: through secure channels, build VPNs with OpenSSH, and more. Focuses on
62: the OpenSSH server, the OpenSSH client, and the PuTTY client.
1.103 tj 63: Michael W. Lucas is the author of <i>Absolute OpenBSD</i> and other BSD books.
64: The official SSH Mastery website is
65: <a href="https://www.michaelwlucas.com/nonfiction/ssh-mastery">here</a>.
1.93 austin 66: <p>
67:
1.89 austin 68: <dt><a name="book10"><i>Absolute OpenBSD. 2nd Edition!</i></a>
1.103 tj 69: <dd>by Michael W. Lucas
70: <dd>ISBN-13: 978-1-59327-476-4
1.94 deraadt 71: <dd>April 2013, 536 pp.
1.103 tj 72: <p>
73: Michael W. Lucas brings us the long anticipated second edition of his
1.93 austin 74: wildly successful book about using OpenBSD. This book covers all aspects of
1.103 tj 75: the OpenBSD system for new UNIX and BSD users alike.
76: The official Absolute OpenBSD 2nd edition website is
1.89 austin 77: <a href="https://www.michaelwlucas.com/nonfiction/absolute-openbsd-2nd-edition">
1.103 tj 78: here</a>.
1.93 austin 79: <p>
80:
1.48 austin 81: <dt><a name="book3">
82: <i>Secure Architectures with OpenBSD</i></a>
1.47 jose 83: <dd>by Brandon Palmer, Jose Nazario.
84: <dd>ISBN 03-21193-66-0
85: <dd>April 2004, 520 pp.
1.103 tj 86: <p>
1.47 jose 87: A guide for system and network administrators who need to move to a
88: more secure operating system and a reference for seasoned OpenBSD users
89: who want to fully exploit every feature of the system. This book
90: covers all aspects of OpenBSD, including systrace, Kerberos V, IPv6 and
91: IPsec, and the development environment.
1.15 philen 92: </dl>
93: <hr>
94:
1.91 deraadt 95: <h3>BSD-specific books</h3>
1.15 philen 96: <dl>
97: <dt>
98: <i>The Design and Implementation of the 4.4 BSD Operating System</i>
99: <dd>by Marshal Kirk McKusick, Keith Bostic, Michael J. Karels, John S. Quarterman
100: <dd>
1.52 millert 101: At 549 pages plus an index, <a href="http://www.awprofessional.com/title/0201549794">this book</a> must be considered comprehensive.
1.15 philen 102: McKusick, Bostic and Karels are well known as prime movers at
103: Berkeley CSRG (Computer Systems Research Group) during the 4.3/4.4BSD
104: period. This book covers the 4.4 and 4.4-Lite releases, and discusses
105: everything you wanted to know about how the system operates. Not
106: 100% applicable, but probably the closest there is to an overall
107: system internals manual for OpenBSD.
1.13 deraadt 108: <p>
1.103 tj 109:
1.15 philen 110: <dt>
111: <i>Source Code Secrets: The Basic 386BSD Operating System Reference
112: (Volume 1 of Operating System Source Code Secrets)</i>
113: <dd>by L. W. Jolitz, William Jolitz; 1997
114: <dd>
115: The Jolitzes built the first port of BSD to the PC-386 architecture,
116: and deserve a lot of credit for making BSD portable to this low-cost
117: architecture. The earliest versions, called "386bsd", were described
1.46 david 118: in articles in <em>Dr. Dobbs Journal</em>. This book goes beyond the articles,
1.15 philen 119: and provides a comprehensive annotated collection of source code.
120: Not all of it applies to modern versions of OpenBSD, of course, but
121: you can still learn a lot from it.
1.13 deraadt 122: <p>
1.103 tj 123:
1.15 philen 124: <dt>
125: <i>Berkeley Unix: A Simple and Comprehensive Guide</i>
126: <dd>by James Wilson
127: <dd>
128: Begins with the basic commands and finishes with advanced programming
129: techniques. Offers strong coverage of systems calls.
130: <p>
1.103 tj 131:
1.15 philen 132: <dt>
133: <i>An Introduction to Berkeley Unix and ANSI C</i>
134: <dd>by Jack Hodges
135: <dd>
136: An introduction to the operating system and the programming language. Intended
137: for self-study, requires no previous knowledge of Unix. Covers the fundamentals
138: of programming; the correct use of syntax; programming style, debugging, logic,
139: and system programming with C.
140: <p>
1.103 tj 141:
1.15 philen 142: <dt>
143: <dt>
144: <i>4.4 BSD User's Reference Manual (URM)</i>
145: <dd>published by O'Reilly, 1994
146: <dd>
1.12 ian 147: This is just a reprint of the man pages for users.
1.2 ian 148: Your OpenBSD distribution includes the online man pages,
149: which are specific to OpenBSD, and more up-to-date. So
1.13 deraadt 150: you don't need this one: use the <em>man</em> command instead.
151: <p>
1.103 tj 152:
1.15 philen 153: <dt>
154: <dt>
155: <i>4.4 BSD System Manager's Manual (SMM)</i>
156: <dd>published by O'Reilly, 1994
157: <dd>
158: This book details what you need to know to run a BSD system.
1.2 ian 159: Quite a bit of this material is relevant to OpenBSD.
160: Unfortunately it is currently out of print.
1.13 deraadt 161: Worse, due to licensing restrictions from AT&T,
162: the electronic editions of these were not included in the
1.86 lum 163: 4.4BSD distributions.
164: They are not included with OpenBSD.
1.17 louis 165: <p>
1.103 tj 166:
1.17 louis 167: <dt>
168: <dt>
169: <i>BSD mit Methode</i>
1.23 horacio 170: <dd>published by C&L Computer- und Literaturverlag GmbH, 1998
1.17 louis 171: <dd>
1.78 deraadt 172: A book in German on all
1.17 louis 173: three freenix BSDs covering the essentials of installation, X configuration
174: and system administration, as well as PERL programming and tips on
175: LaTeX/Lyx. The book also covers the KDE desktop environment.
176: <br>Includes older versions of OpenBSD on the two included CD-ROMs.
1.85 deraadt 177: <br><a href="http://www.lob.de/cgi-bin/work/frameset?flag=jfl&frame=yes&id=38effe1813566">
178: Lehmann's Online Bookshop</a>. However, you might want to pick up a <a
1.36 jufi 179: href="http://www.lob.de/cgi-bin/work/frameset?flag=jfl&frame=yes&id=38effe1813566">more
1.17 louis 180: recent version of the CD-ROM</a>.
1.103 tj 181: <p>
1.61 grunk 182:
183: <dt>
184: <dt>
185: <i>The OpenBSD PF Packet Filter Book</i>
186: <dd>
187: published by Reed Media Services
188: <dd>
189: August 2006, 193 pp.
190: <dd>
1.62 steven 191: This book is an expanded, cross-referenced, indexed, edited, and reformatted
192: version of the <a href="faq/pf/index.html">PF User's Guide</a>.
1.61 grunk 193: It also covers spamd and introduces the setup and differences of PF
1.104 ! tb 194: on NetBSD, DragonFly, and FreeBSD.<br>
! 195: The official book website with table of contents, index, and
1.61 grunk 196: configuration examples can be found at
197: <a href="http://www.reedmedia.net/books/pf-book/">http://www.reedmedia.net/books/pf-book/</a>.
1.15 philen 198: </dl>
199: <hr>
1.2 ian 200:
1.91 deraadt 201: <h3>Unix user guides</h3>
1.15 philen 202: <dl>
203: <dt><i>Unix Made Easy</i>
204: <dd>by John Muster
205: <dd>A general Unix book that covers all areas of the system.
206: <p>
1.103 tj 207:
1.15 philen 208: <dt><i>UNIX Power Tools</i>
209: <dd>by Jerry D. Peek, Tim O'Reilly, and Mike Loukides
210: <dd>
1.58 grunk 211: This book is now in its third edition. It discusses
1.15 philen 212: hundreds of neat tricks, little-known techniques, and add-on utilities.
213: Be aware that many of the utilities are either included with OpenBSD
214: or, more commonly, are already available as ports or packages.
215: So most of section 52.03, complaining about how hard it is to port
216: software to different UNIXes, can be disregarded if you learn about the
1.80 steven 217: <a href="faq/ports/index.html">Ports Mechanism</a>
1.15 philen 218: that is part of OpenBSD.
1.18 ericj 219: <p>
1.103 tj 220:
1.18 ericj 221: <dt><i><a href="http://www.rodsbooks.com/multiboot/">The Multi-Boot Configuration Handbook</a></i>
222: <dd>by Rod Smith
223: <dd>
224: <dd>
225: Book explaining techniques for Multi-booting.
1.15 philen 226: </dl>
227: <hr>
1.1 ian 228:
1.91 deraadt 229: <h3>Unix administration</h3>
1.15 philen 230: <dl>
231: <dt><i>UNIX System Administration Handbook</i>
232: <dd>by Evi Nemeth, Garth Snyder, Scott Seebass, Trent R. Hein
233: <dd>
234: This is an excellent book on Unix system administration.
235: <p>
1.103 tj 236:
237: <dt><a name="book11"><i>Sudo Mastery</i></a>
238: <dd>by Michael W. Lucas
239: <dd>ISBN-13: 978-1493626205
240: <dd>ISBN-10: 1493626205
241: <dd>October 2013, 144pp.
242: <dd>Access Control for Real People
243: <p>
244: Unix-like operating systems use a rudimentary access control system:
245: the root account can do anything, while other users are peasants with
246: only minimal access. This worked fine in UNIX's youth, but today,
247: system administration responsibilities are spread among many people
248: and applications. Different people may need different slices of
249: root's power. However pros and cons are considered as well.
250: This book also thoroughly covers sudo's extended features.
251: The official Sudo Mastery website is
252: <a href="https://www.michaelwlucas.com/nonfiction/sudo-mastery">here</a>.
253: <p>
254:
1.15 philen 255: <dt><i>Essential System Administration</i>
1.103 tj 256: <dd>by Æleen Frisch
1.15 philen 257: <dd>
258: This book covers many fundamental tasks in system administration. It includes
259: examples for a wide range of Unix operating systems, including BSD.
260: </dl>
261: <hr>
1.1 ian 262:
1.91 deraadt 263: <h3>Unix programming</h3>
1.15 philen 264: <dl>
265: <dt><i>Unix Systems for Modern Architectures</i>
266: <dd>by Curt Schimmel
267: <dd>
1.24 ian 268: This book leads its reader through all the low-level kernel models for
1.53 jsg 269: multi-processing architectures.
1.15 philen 270: <p>
1.103 tj 271:
1.15 philen 272: <dt><i>Lions' Commentary on UNIX 6th Edition with Source Code</i>
273: <dd>by John Lions
274: <dd>
1.2 ian 275: Although the UNIX described in this book is to BSD as a Model T Ford
1.1 ian 276: is to a 70's Mustang or Thunderbird, UNIX inventor Ken Thompson
277: claims that "After 20 years, this is still the best exposition
278: of the workings of a 'real' operating system." Originally circulated
279: in illicit photocopies, this is the book that most first- and second-generation
280: UNIX hackers cut their code-teeth on. Recommended as a good introduction
281: to how a timesharing OS works, if you've not been inside one before.
282: Substantially shorter than the McKusick book above.
1.15 philen 283: <p>
1.103 tj 284:
1.15 philen 285: <dt><i>The Practice of Programming</i>
286: <dd>by Brian W. Kernighan and Rob Pike
287: <dd>
288: Brian Kernighan had a hand in two other books which we recommend even though they're not UNIX specific, but are useful to programmers on UNIX and elsewhere.
289: This book covers practical programming considerations for C, C++ and Java.
290: Highly recommended.
1.46 david 291: <p>
1.103 tj 292:
1.15 philen 293: <dt><i>The Elements of Programming Style</i>
294: <dd>by Brian W. Kernighan and P. J. Plauger
295: <dd>
296: This book is similar to <i>The Practice of Programming</i>, but older. The
297: examples are given in Fortran and PL/I.
1.16 chris 298: <p>
1.103 tj 299:
1.60 grunk 300: <dt><i>Advanced Programming in the Unix Environment (2nd Edition)</i>
301: <dd>by W. Richard Stevens, Stephen A. Rago
1.16 chris 302: <dd>
303: This is a very detailed and easy to read book. It has several examples
304: that you can learn from. There is plenty of information about library and
305: system calls, and associated information so that you can use them.
306: This book along with the OpenBSD manual pages
307: make an excellent combination.
1.36 jufi 308: <p>
1.103 tj 309:
1.25 chris 310: <dt><i>The C Programming Language</i>
311: <dd>by Brian W. Kernighan and Dennis M. Ritchie
312: <dd>
313: This is a clear and concise guide to the C programming language,
314: perhaps the only one you will ever need. It focuses strictly on the C language,
315: not how to use your compiler or anything else.
1.36 jufi 316: <p>
1.103 tj 317:
1.46 david 318: <dt><i>C: A Reference Manual</i>
1.25 chris 319: <dd>by Samuel P. Harbison and Guy L. Steele
320: <dd>
1.46 david 321: If you only had two books on C, then along with <i>The C Programming Language</i>, this would be your second one!
1.25 chris 322: This book is not a tutorial (hence the title), it deals with syntax, data types,
323: ISO C library functions, and C/C++ compatibility.
1.36 jufi 324: <p>
1.103 tj 325:
1.64 steven 326: <dt><i>The Art of Software Security Assessment</i>
1.63 otto 327: <dd>by Mark Dowd, John McDonald and Justin Schuh
328: <dd>Covers code auditing, design and operational review, types of
329: vulnerabilities, privilege models, signals,
330: interprocess communication, synchronization, networking and more.
331: Lots of examples and real world code snippets.
1.15 philen 332: </dl>
1.25 chris 333:
1.15 philen 334: <hr>
335:
1.91 deraadt 336: <h3>Network administration</h3>
1.15 philen 337: <dl>
1.68 grunk 338: <dt><i><a name="book6" href="http://www.sshbuch.de/">Das SSH-Buch</a></i>
339: (German)
1.67 grunk 340: <dd>by Timo Dotzauer and Tobias Lütticke
341: <dd>ISBN 3-938626-03-8
342: <dd>Millin Verlag, December 2006, 600p.
343: <dd>This book covers the theory behind OpenSSH (protocol, channels, standards
344: documents) as well as using OpenSSH as an end user.
345: Although using Linux as a reference OS, many of the examples also have
346: a description how to get things done under BSD.
347: In a separate cookbook chapter, several scenarios from daily work are solved
348: using OpenSSH.
349: Furthermore, this book is the first German book to cover VPN via OpenSSH.
1.77 deraadt 350: <dd>
1.67 grunk 351: <p>
1.103 tj 352:
353: <dt><a name="book12"><i>DNSSEC Mastery</i></a>
354: <dd>by Michael W. Lucas
355: <dd>ISBN-13: 978-1484924471
356: <dd>ISBN-10: 1484924479
357: <dd>May 2013, 130 pp.
358: <dd>Securing the Domain Name System with BIND
359: <p>
360: DNS is one of the oldest protocols on the Internet, and was designed
361: for a network without hostile users. Anyone who wants to break into a
362: network starts by investigating the target's Domain Name Service.
363: <p>
364: In addition to providing a manual for BIND, this book thoroughly targets
365: the extensions which are available in the port net/isc-bind. DNS Security
366: Extensions, or DNSSEC, harden DNS. But learning DNSSEC requires
367: wading through years of obsolete tutorials, dead ends, and
368: inscrutable standards. Strengths and weaknesses of DNSSEC are
369: discussed.
370: <p>
371: The official DNSSEC Mastery website is
372: <a href="https://www.michaelwlucas.com/nonfiction/dnssec-mastery">
373: here</a>.
374: <p>
375:
1.22 aaron 376: <dt><i>SSH, The Secure Shell.</i>
377: <dd>by Daniel J. Barrett and Richard Silverman
378: <dd>The Definitive Guide. OpenSSH is covered in detail.
379: <p>
1.103 tj 380:
1.15 philen 381: <dt><i>TCP/IP Illustrated, Volume 1</i>
382: <dd>by W. Richard Stevens
383: <dd>
384: "Network administration" is really an inappropriate heading for this book. It
385: is an encyclopedia of the TCP/IP protocol suite. This book provides information,
1.35 pvalchev 386: and diagrams useful to understand the suite to its lowest level.
1.15 philen 387: Home enthusiasts, developers, and network administrators alike will enjoy this
388: book.
389: <p>
1.103 tj 390:
1.20 chris 391: <dt><i>Kerberos: A Network Authentication System</i>
392: <dd>by Brian Tung
393: <dd>
394: A guide for administrators of Kerberos-based networks. Explains concepts of
395: the Kerberos system, as well as the installation and administration of it.
396: <p>
1.103 tj 397:
1.34 miod 398: <dt><i>IPsec: The New Security Standard for the Internet, Intranets and Virtual
1.20 chris 399: Private Networks</i>
400: <dd>by Naganand Doraswamy and Dan Harkins
401: <dd>
1.34 miod 402: This book explains the IPsec protocol suite. It also describes its relation
1.20 chris 403: to the current deployments, such as VPNs, and future ideas.
1.36 jufi 404: <p>
1.103 tj 405:
1.20 chris 406: <dt><i>Computer Networks</i>
407: <dd>by Andy Tanenbaum
408: <dd>
409: This book is an high-level guide to modern computer networking. It presents
410: a wide range of protocols, concepts, and technologies. It covers technologies
411: from fiber to wireless, LANs, Mobile IP, and a lot more.
1.36 jufi 412: <p>
1.103 tj 413:
1.15 philen 414: <dt><i>DNS and BIND</i>
415: <dd>by Paul Albitz and Cricket Liu
416: <dd>
417: This book is an excellent introduction to DNS and BIND, useful for
418: anyone who has to implement DNS under OpenBSD.
419: <p>
1.103 tj 420:
1.15 philen 421: <dt><i>DHCP</i>
422: <dd>by Ted Lemon and Ralph E. Droms
423: <dd>
1.46 david 424: Recommended by the <a href="http://www.isc.org/">Internet Software Consortium</a>,
1.15 philen 425: which is the organization that produces the DHCP client/server software
426: included with OpenBSD.
427: <p>
1.103 tj 428:
1.15 philen 429: <dt><i>Managing NFS and NIS</i>
430: <dd>by Hal Stern
431: <dd>
432: Gives essential information with examples on managing NFS and NIS.
1.37 dhartmei 433: <p>
1.103 tj 434:
1.37 dhartmei 435: <dt><i>802.11 Security</i>
436: <dd>by Bruce Potter and Bob Fleck
437: <dd>
438: Provides information on the fundamentals of wireless security, including
439: practical solutions for setting up clients, access points and gateways
440: under several operating systems. Two chapters are dedicated to OpenBSD 3.1,
441: covering wi, bridge, pf and altq.
1.25 chris 442: </dl>
1.21 chris 443:
1.25 chris 444: <hr>
1.91 deraadt 445: <h3>Cryptography</h3>
1.21 chris 446: <dl>
447: <dt><i>Applied Cryptography: Protocols, Algorithms, and Source Code in C</i>
448: <dd>by Bruce Schneier
449: <dd>
450: A comprehensive explanation of Cryptography, with information
451: about its history, protocols, and algorithms. This book is a great
452: introduction to cryptography, with the necessary basics
453: to understand the field. Also, it has a very extensive reference section.
1.36 jufi 454: <br>
455: <p>
1.103 tj 456:
1.30 jsyn 457: <dt><i>Handbook of Applied Cryptography</i>
1.26 ian 458: <dd>by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone
459: <dd>A new and detailed look at Cryptography. The authors write:
460: <dd>
461: ... Public-key cryptographic techniques
462: are now in widespread use, especially in the financial services
463: industry, in the public sector, and by individuals for their personal
464: privacy, such as in electronic mail. This Handbook will serve as a
465: valuable reference for the novice as well as for the expert who
466: needs a wider scope of coverage within the area of cryptography.
467: It is a necessary and timely guide for professionals who practice
468: the art of cryptography.
469: <dd>The entire book is
1.55 grunk 470: <a href="http://www.cacr.math.uwaterloo.ca/hac/">
1.26 ian 471: available for free downloading</a> (for personal use only)
472: from the book authors' site, in PDF or PostScript.
473: <dd>
474: <p>
1.103 tj 475:
1.25 chris 476: <dt><i>SSL and TLS Essentials: Securing the Web</i>
477: <dd>by Stephen A. Thomas
478: <dd>
479: This book offers introductory coverage of the SSL and TLS protocols, with
480: examples. The SSL protocol
481: is currently the basis of secure data transfer and secure transactions
482: on the Internet. Aside from encryption, this book also covers data
483: integrity and details the SSL protocol.
484: <dd>
485: <p>
1.103 tj 486:
1.39 jose 487: <dt><i>SSL and TLS: Designing and Building Secure Systems</i>
488: <dd>by Eric Rescorla
489: <dd>
490: This book offers comprehensive information about the SSL and TLS protocols,
491: covering their operation and security,
492: together with usage and implementation details.
493: There are also chapters about HTTP over SSL, and SMTP over TLS (STARTTLS).
494: Eric Rescorla is the author of <tt>ssldump</tt>, a utility that can be
495: used to monitor SSL connections.
496: He has written several commercial and free SSL implementations.
497: <dd>
498: <p>
1.103 tj 499:
1.25 chris 500: <dt><i>Big Book of IPsec RFCs: Internet Security Architecture</i>
501: <dd>compiled by Pete Loshin
502: <dd>
1.54 nick 503: A complete reprint of the IPsec RFCs with an extensive index and
504: glossary.
1.25 chris 505: <dd>
1.15 philen 506: </dl>
1.13 deraadt 507:
508: </body>
509: </html>