Annotation of www/books.html, Revision 1.117
1.116 bentley 1: <!doctype html>
2: <html lang=en>
3: <meta charset=utf-8>
4:
5: <title>OpenBSD: Books</title>
1.103 tj 6: <meta name="description" content="Books about OpenBSD and UNIX">
1.15 philen 7: <meta name="generator" content="The vi editor from UNIX">
8: <meta name="Author" content="Ian Darwin">
1.104 tb 9: <meta name="viewport" content="width=device-width, initial-scale=1">
10: <link rel="stylesheet" type="text/css" href="openbsd.css">
1.108 tb 11: <link rel="canonical" href="https://www.openbsd.org/books.html">
1.13 deraadt 12:
1.116 bentley 13: <h2 id=OpenBSD>
1.105 tb 14: <a href="index.html">
1.116 bentley 15: <i>Open</i><b>BSD</b></a>
16: Books
1.104 tb 17: </h2>
1.116 bentley 18:
1.104 tb 19: <hr>
1.116 bentley 20:
1.13 deraadt 21: <p>
1.103 tj 22: Note that the information in some older books may no longer be accurate
23: or relevant to modern OpenBSD.
1.116 bentley 24:
1.36 jufi 25: <hr>
1.1 ian 26:
1.91 deraadt 27: <h3>OpenBSD-specific books</h3>
1.15 philen 28: <dl>
1.113 tj 29:
1.116 bentley 30: <dt id="book14"><i>Httpd and Relayd Mastery</i>
1.113 tj 31: <dd>by Michael W. Lucas
32: <dd>ISBN-10: 1-54675-206-4
33: <dd>ISBN-13: 978-1-54675-206-6
34: <dd>May 2017, 232 pp.
35: <p>
36: "I think we're gonna need a bigger web server."
37: <p>
38: OpenBSD has a solid reputation for security and stability.
39: It's well known for the OpenSMTPd mail server, the LibreSSL cryptography
40: library, and the PF packet filter. But nobody ever talks about the load
41: balancer, or the web server.
42: <p>
43: Until now.
44: <p>
45: The httpd web server provides a fast, stable, secure environment for your
46: web applications. The relayd load balancer lets you distribute Internet
47: application load across multiple hosts. Between the two, you can slash
48: hundreds of thousands of dollars off the cost of building, deploying,
49: and managing applications.
50: <p>
1.89 austin 51:
1.116 bentley 52: <dt id="book13"><i>The Book of PF, 3rd Edition<br>
53: A No-Nonsense Guide to the OpenBSD Firewall</i>
1.97 austin 54: <dd>by Peter N. M. Hansteen
55: <dd>ISBN-10: 1-59327-589-7
56: <dd>ISBN-13: 978-1-59327-589-1
1.115 schwarze 57: <dd>October 2014, 248 pp.
1.97 austin 58: <p>
1.117 ! deraadt 59: The first sentence of this book is "<i>This is a book about building the
! 60: network you need.</i>" Taking it from there, Peter walks you through the whys
1.72 wvdputte 61: and the hows of building the high performance, low maintenance network you need,
1.103 tj 62: using OpenBSD tools.
1.117 ! deraadt 63: The book covers all bases, from the basic one machine configuration and basic
! 64: local area networks, all the way up to configurations with traffic shaping and
! 65: load balancing with "self-healing" networks and countermeasures against common
! 66: problems such as DoS attempts and spamming. A basic understanding of TCP/IP
1.103 tj 67: and some Unix knowledge is assumed.
1.117 ! deraadt 68: The official book website for a sample chapter, table of contents and errata
1.115 schwarze 69: can be found <a href="https://nostarch.com/pf3">here</a>.
1.93 austin 70: <p>
1.89 austin 71:
1.116 bentley 72: <dt id="book9"><i>SSH Mastery, 2nd Edition<br>
73: OpenSSH, PuTTY, Tunnels and Keys</i>
1.103 tj 74: <dd>by Michael W. Lucas
1.115 schwarze 75: <dd>ISBN-10: 1642350028
76: <dd>ISBN-13: 978-1642350029
77: <dd>February 2018, 242 pp.
1.103 tj 78: <p>
1.87 austin 79: A guide to what you need to know about SSH. This book will help you
80: eliminate passwords on your network, tunnel unencrypted protocols
81: through secure channels, build VPNs with OpenSSH, and more. Focuses on
82: the OpenSSH server, the OpenSSH client, and the PuTTY client.
1.103 tj 83: Michael W. Lucas is the author of <i>Absolute OpenBSD</i> and other BSD books.
1.115 schwarze 84: The official SSH Mastery 2nd edition website is
85: <a href="https://www.michaelwlucas.com/tools/ssh">here</a>.
1.93 austin 86: <p>
87:
1.116 bentley 88: <dt id="book10"><i>Absolute OpenBSD. 2nd Edition!</i>
1.103 tj 89: <dd>by Michael W. Lucas
1.115 schwarze 90: <dd>ISBN-10: 1593274769
1.103 tj 91: <dd>ISBN-13: 978-1-59327-476-4
1.94 deraadt 92: <dd>April 2013, 536 pp.
1.103 tj 93: <p>
1.117 ! deraadt 94: Michael W. Lucas brings us the long anticipated second edition of his
! 95: wildly successful book about using OpenBSD. This book covers all aspects of
1.103 tj 96: the OpenBSD system for new UNIX and BSD users alike.
97: The official Absolute OpenBSD 2nd edition website is
1.115 schwarze 98: <a href="https://www.michaelwlucas.com/os/ao2e">here</a>.
1.93 austin 99: <p>
100:
1.116 bentley 101: <dt id="book3">
102: <i>Secure Architectures with OpenBSD</i>
1.47 jose 103: <dd>by Brandon Palmer, Jose Nazario.
104: <dd>ISBN 03-21193-66-0
105: <dd>April 2004, 520 pp.
1.103 tj 106: <p>
1.117 ! deraadt 107: A guide for system and network administrators who need to move to a
! 108: more secure operating system and a reference for seasoned OpenBSD users
1.47 jose 109: who want to fully exploit every feature of the system. This book
110: covers all aspects of OpenBSD, including systrace, Kerberos V, IPv6 and
111: IPsec, and the development environment.
1.15 philen 112: </dl>
113: <hr>
114:
1.91 deraadt 115: <h3>BSD-specific books</h3>
1.15 philen 116: <dl>
117: <dt>
1.111 tb 118: <i>The Design and Implementation of the 4.4BSD Operating System</i>
1.15 philen 119: <dd>by Marshal Kirk McKusick, Keith Bostic, Michael J. Karels, John S. Quarterman
1.111 tb 120: <dd>ISBN-10: 0132317923
1.117 ! deraadt 121: <dd>ISBN-13: 978-0132317924
1.15 philen 122: <dd>
1.111 tb 123: At 549 pages plus an index, this book must be considered comprehensive.
1.15 philen 124: McKusick, Bostic and Karels are well known as prime movers at
125: Berkeley CSRG (Computer Systems Research Group) during the 4.3/4.4BSD
126: period. This book covers the 4.4 and 4.4-Lite releases, and discusses
127: everything you wanted to know about how the system operates. Not
128: 100% applicable, but probably the closest there is to an overall
129: system internals manual for OpenBSD.
1.13 deraadt 130: <p>
1.103 tj 131:
1.15 philen 132: <dt>
133: <i>Source Code Secrets: The Basic 386BSD Operating System Reference
134: (Volume 1 of Operating System Source Code Secrets)</i>
135: <dd>by L. W. Jolitz, William Jolitz; 1997
136: <dd>
137: The Jolitzes built the first port of BSD to the PC-386 architecture,
138: and deserve a lot of credit for making BSD portable to this low-cost
139: architecture. The earliest versions, called "386bsd", were described
1.46 david 140: in articles in <em>Dr. Dobbs Journal</em>. This book goes beyond the articles,
1.15 philen 141: and provides a comprehensive annotated collection of source code.
142: Not all of it applies to modern versions of OpenBSD, of course, but
143: you can still learn a lot from it.
1.13 deraadt 144: <p>
1.103 tj 145:
1.15 philen 146: <dt>
147: <i>Berkeley Unix: A Simple and Comprehensive Guide</i>
148: <dd>by James Wilson
149: <dd>
150: Begins with the basic commands and finishes with advanced programming
151: techniques. Offers strong coverage of systems calls.
152: <p>
1.103 tj 153:
1.15 philen 154: <dt>
155: <i>An Introduction to Berkeley Unix and ANSI C</i>
156: <dd>by Jack Hodges
157: <dd>
158: An introduction to the operating system and the programming language. Intended
159: for self-study, requires no previous knowledge of Unix. Covers the fundamentals
160: of programming; the correct use of syntax; programming style, debugging, logic,
161: and system programming with C.
162: <p>
1.103 tj 163:
1.15 philen 164: <dt>
165: <dt>
1.112 tb 166: <i>4.4BSD User's Reference Manual (URM)</i>
1.15 philen 167: <dd>published by O'Reilly, 1994
168: <dd>
1.117 ! deraadt 169: This is just a reprint of the man pages for users.
1.2 ian 170: Your OpenBSD distribution includes the online man pages,
1.110 tj 171: which are specific to OpenBSD, and more up to date. So
1.13 deraadt 172: you don't need this one: use the <em>man</em> command instead.
173: <p>
1.103 tj 174:
1.15 philen 175: <dt>
176: <dt>
1.112 tb 177: <i>4.4BSD System Manager's Manual (SMM)</i>
1.15 philen 178: <dd>published by O'Reilly, 1994
179: <dd>
180: This book details what you need to know to run a BSD system.
1.2 ian 181: Quite a bit of this material is relevant to OpenBSD.
182: Unfortunately it is currently out of print.
1.13 deraadt 183: Worse, due to licensing restrictions from AT&T,
184: the electronic editions of these were not included in the
1.86 lum 185: 4.4BSD distributions.
186: They are not included with OpenBSD.
1.17 louis 187: <p>
1.103 tj 188:
1.17 louis 189: <dt>
190: <dt>
191: <i>BSD mit Methode</i>
1.23 horacio 192: <dd>published by C&L Computer- und Literaturverlag GmbH, 1998
1.17 louis 193: <dd>
1.78 deraadt 194: A book in German on all
1.17 louis 195: three freenix BSDs covering the essentials of installation, X configuration
196: and system administration, as well as PERL programming and tips on
197: LaTeX/Lyx. The book also covers the KDE desktop environment.
1.117 ! deraadt 198: <br>Includes older versions of OpenBSD on the two included CD-ROMs.
1.109 tb 199: <br><a href="http://www.lob.de/isbn/9783932311314">Lehmann's Online Bookshop</a>.
200: However, you might want to pick up a more recent version of the CD-ROM.
1.103 tj 201: <p>
1.61 grunk 202:
203: <dt>
204: <dt>
205: <i>The OpenBSD PF Packet Filter Book</i>
206: <dd>
207: published by Reed Media Services
208: <dd>
209: August 2006, 193 pp.
210: <dd>
1.62 steven 211: This book is an expanded, cross-referenced, indexed, edited, and reformatted
212: version of the <a href="faq/pf/index.html">PF User's Guide</a>.
1.61 grunk 213: It also covers spamd and introduces the setup and differences of PF
1.104 tb 214: on NetBSD, DragonFly, and FreeBSD.<br>
215: The official book website with table of contents, index, and
1.61 grunk 216: configuration examples can be found at
217: <a href="http://www.reedmedia.net/books/pf-book/">http://www.reedmedia.net/books/pf-book/</a>.
1.15 philen 218: </dl>
219: <hr>
1.2 ian 220:
1.91 deraadt 221: <h3>Unix user guides</h3>
1.15 philen 222: <dl>
223: <dt><i>Unix Made Easy</i>
224: <dd>by John Muster
1.117 ! deraadt 225: <dd>A general Unix book that covers all areas of the system.
1.15 philen 226: <p>
1.103 tj 227:
1.15 philen 228: <dt><i>UNIX Power Tools</i>
229: <dd>by Jerry D. Peek, Tim O'Reilly, and Mike Loukides
230: <dd>
1.58 grunk 231: This book is now in its third edition. It discusses
1.15 philen 232: hundreds of neat tricks, little-known techniques, and add-on utilities.
233: Be aware that many of the utilities are either included with OpenBSD
234: or, more commonly, are already available as ports or packages.
235: So most of section 52.03, complaining about how hard it is to port
236: software to different UNIXes, can be disregarded if you learn about the
1.107 juanfra 237: <a href="faq/ports/index.html">Ports System</a>
1.15 philen 238: that is part of OpenBSD.
1.18 ericj 239: <p>
1.103 tj 240:
1.18 ericj 241: <dt><i><a href="http://www.rodsbooks.com/multiboot/">The Multi-Boot Configuration Handbook</a></i>
242: <dd>by Rod Smith
243: <dd>
244: <dd>
245: Book explaining techniques for Multi-booting.
1.15 philen 246: </dl>
247: <hr>
1.1 ian 248:
1.91 deraadt 249: <h3>Unix administration</h3>
1.15 philen 250: <dl>
251: <dt><i>UNIX System Administration Handbook</i>
252: <dd>by Evi Nemeth, Garth Snyder, Scott Seebass, Trent R. Hein
253: <dd>
1.117 ! deraadt 254: This is an excellent book on Unix system administration.
1.15 philen 255: <p>
1.103 tj 256:
1.116 bentley 257: <dt id="book11"><i>Sudo Mastery</i>
1.103 tj 258: <dd>by Michael W. Lucas
1.117 ! deraadt 259: <dd>ISBN-13: 978-1493626205
! 260: <dd>ISBN-10: 1493626205
! 261: <dd>October 2013, 144pp.
1.103 tj 262: <dd>Access Control for Real People
1.117 ! deraadt 263: <p>
1.103 tj 264: Unix-like operating systems use a rudimentary access control system:
265: the root account can do anything, while other users are peasants with
266: only minimal access. This worked fine in UNIX's youth, but today,
267: system administration responsibilities are spread among many people
268: and applications. Different people may need different slices of
269: root's power. However pros and cons are considered as well.
270: This book also thoroughly covers sudo's extended features.
271: The official Sudo Mastery website is
272: <a href="https://www.michaelwlucas.com/nonfiction/sudo-mastery">here</a>.
273: <p>
274:
1.15 philen 275: <dt><i>Essential System Administration</i>
1.103 tj 276: <dd>by Æleen Frisch
1.15 philen 277: <dd>
278: This book covers many fundamental tasks in system administration. It includes
279: examples for a wide range of Unix operating systems, including BSD.
280: </dl>
281: <hr>
1.1 ian 282:
1.91 deraadt 283: <h3>Unix programming</h3>
1.15 philen 284: <dl>
285: <dt><i>Unix Systems for Modern Architectures</i>
286: <dd>by Curt Schimmel
287: <dd>
1.117 ! deraadt 288: This book leads its reader through all the low-level kernel models for
1.53 jsg 289: multi-processing architectures.
1.15 philen 290: <p>
1.103 tj 291:
1.15 philen 292: <dt><i>Lions' Commentary on UNIX 6th Edition with Source Code</i>
293: <dd>by John Lions
294: <dd>
1.2 ian 295: Although the UNIX described in this book is to BSD as a Model T Ford
1.1 ian 296: is to a 70's Mustang or Thunderbird, UNIX inventor Ken Thompson
297: claims that "After 20 years, this is still the best exposition
298: of the workings of a 'real' operating system." Originally circulated
299: in illicit photocopies, this is the book that most first- and second-generation
300: UNIX hackers cut their code-teeth on. Recommended as a good introduction
301: to how a timesharing OS works, if you've not been inside one before.
302: Substantially shorter than the McKusick book above.
1.15 philen 303: <p>
1.103 tj 304:
1.15 philen 305: <dt><i>The Practice of Programming</i>
306: <dd>by Brian W. Kernighan and Rob Pike
307: <dd>
308: Brian Kernighan had a hand in two other books which we recommend even though they're not UNIX specific, but are useful to programmers on UNIX and elsewhere.
1.117 ! deraadt 309: This book covers practical programming considerations for C, C++ and Java.
1.15 philen 310: Highly recommended.
1.46 david 311: <p>
1.103 tj 312:
1.15 philen 313: <dt><i>The Elements of Programming Style</i>
314: <dd>by Brian W. Kernighan and P. J. Plauger
315: <dd>
316: This book is similar to <i>The Practice of Programming</i>, but older. The
1.117 ! deraadt 317: examples are given in Fortran and PL/I.
1.16 chris 318: <p>
1.103 tj 319:
1.114 tb 320: <dt><i>Advanced Programming in the Unix Environment (3rd Edition)</i>
1.60 grunk 321: <dd>by W. Richard Stevens, Stephen A. Rago
1.16 chris 322: <dd>
323: This is a very detailed and easy to read book. It has several examples
324: that you can learn from. There is plenty of information about library and
325: system calls, and associated information so that you can use them.
326: This book along with the OpenBSD manual pages
327: make an excellent combination.
1.36 jufi 328: <p>
1.103 tj 329:
1.25 chris 330: <dt><i>The C Programming Language</i>
331: <dd>by Brian W. Kernighan and Dennis M. Ritchie
332: <dd>
333: This is a clear and concise guide to the C programming language,
334: perhaps the only one you will ever need. It focuses strictly on the C language,
335: not how to use your compiler or anything else.
1.36 jufi 336: <p>
1.103 tj 337:
1.117 ! deraadt 338: <dt><i>C: A Reference Manual</i>
! 339: <dd>by Samuel P. Harbison and Guy L. Steele
1.25 chris 340: <dd>
1.46 david 341: If you only had two books on C, then along with <i>The C Programming Language</i>, this would be your second one!
1.25 chris 342: This book is not a tutorial (hence the title), it deals with syntax, data types,
343: ISO C library functions, and C/C++ compatibility.
1.36 jufi 344: <p>
1.103 tj 345:
1.64 steven 346: <dt><i>The Art of Software Security Assessment</i>
1.63 otto 347: <dd>by Mark Dowd, John McDonald and Justin Schuh
348: <dd>Covers code auditing, design and operational review, types of
349: vulnerabilities, privilege models, signals,
350: interprocess communication, synchronization, networking and more.
351: Lots of examples and real world code snippets.
1.15 philen 352: </dl>
1.25 chris 353:
1.15 philen 354: <hr>
355:
1.91 deraadt 356: <h3>Network administration</h3>
1.15 philen 357: <dl>
1.116 bentley 358: <dt id="book6">><i>Das SSH-Buch</i>
1.68 grunk 359: (German)
1.67 grunk 360: <dd>by Timo Dotzauer and Tobias Lütticke
361: <dd>ISBN 3-938626-03-8
362: <dd>Millin Verlag, December 2006, 600p.
363: <dd>This book covers the theory behind OpenSSH (protocol, channels, standards
364: documents) as well as using OpenSSH as an end user.
365: Although using Linux as a reference OS, many of the examples also have
366: a description how to get things done under BSD.
367: In a separate cookbook chapter, several scenarios from daily work are solved
368: using OpenSSH.
369: Furthermore, this book is the first German book to cover VPN via OpenSSH.
1.77 deraadt 370: <dd>
1.67 grunk 371: <p>
1.103 tj 372:
1.116 bentley 373: <dt id="book12"><i>DNSSEC Mastery</i>
1.103 tj 374: <dd>by Michael W. Lucas
375: <dd>ISBN-13: 978-1484924471
376: <dd>ISBN-10: 1484924479
377: <dd>May 2013, 130 pp.
378: <dd>Securing the Domain Name System with BIND
379: <p>
380: DNS is one of the oldest protocols on the Internet, and was designed
381: for a network without hostile users. Anyone who wants to break into a
382: network starts by investigating the target's Domain Name Service.
383: <p>
384: In addition to providing a manual for BIND, this book thoroughly targets
385: the extensions which are available in the port net/isc-bind. DNS Security
386: Extensions, or DNSSEC, harden DNS. But learning DNSSEC requires
387: wading through years of obsolete tutorials, dead ends, and
388: inscrutable standards. Strengths and weaknesses of DNSSEC are
389: discussed.
390: <p>
391: The official DNSSEC Mastery website is
392: <a href="https://www.michaelwlucas.com/nonfiction/dnssec-mastery">
393: here</a>.
394: <p>
395:
1.22 aaron 396: <dt><i>SSH, The Secure Shell.</i>
397: <dd>by Daniel J. Barrett and Richard Silverman
398: <dd>The Definitive Guide. OpenSSH is covered in detail.
399: <p>
1.103 tj 400:
1.15 philen 401: <dt><i>TCP/IP Illustrated, Volume 1</i>
402: <dd>by W. Richard Stevens
403: <dd>
404: "Network administration" is really an inappropriate heading for this book. It
405: is an encyclopedia of the TCP/IP protocol suite. This book provides information,
1.35 pvalchev 406: and diagrams useful to understand the suite to its lowest level.
1.15 philen 407: Home enthusiasts, developers, and network administrators alike will enjoy this
408: book.
409: <p>
1.103 tj 410:
1.20 chris 411: <dt><i>Kerberos: A Network Authentication System</i>
412: <dd>by Brian Tung
413: <dd>
414: A guide for administrators of Kerberos-based networks. Explains concepts of
415: the Kerberos system, as well as the installation and administration of it.
416: <p>
1.103 tj 417:
1.34 miod 418: <dt><i>IPsec: The New Security Standard for the Internet, Intranets and Virtual
1.20 chris 419: Private Networks</i>
1.117 ! deraadt 420: <dd>by Naganand Doraswamy and Dan Harkins
1.20 chris 421: <dd>
1.34 miod 422: This book explains the IPsec protocol suite. It also describes its relation
1.20 chris 423: to the current deployments, such as VPNs, and future ideas.
1.36 jufi 424: <p>
1.103 tj 425:
1.20 chris 426: <dt><i>Computer Networks</i>
427: <dd>by Andy Tanenbaum
428: <dd>
429: This book is an high-level guide to modern computer networking. It presents
430: a wide range of protocols, concepts, and technologies. It covers technologies
431: from fiber to wireless, LANs, Mobile IP, and a lot more.
1.36 jufi 432: <p>
1.103 tj 433:
1.15 philen 434: <dt><i>DNS and BIND</i>
435: <dd>by Paul Albitz and Cricket Liu
436: <dd>
437: This book is an excellent introduction to DNS and BIND, useful for
438: anyone who has to implement DNS under OpenBSD.
439: <p>
1.103 tj 440:
1.15 philen 441: <dt><i>DHCP</i>
442: <dd>by Ted Lemon and Ralph E. Droms
443: <dd>
1.46 david 444: Recommended by the <a href="http://www.isc.org/">Internet Software Consortium</a>,
1.15 philen 445: which is the organization that produces the DHCP client/server software
446: included with OpenBSD.
447: <p>
1.103 tj 448:
1.15 philen 449: <dt><i>Managing NFS and NIS</i>
450: <dd>by Hal Stern
451: <dd>
1.117 ! deraadt 452: Gives essential information with examples on managing NFS and NIS.
1.37 dhartmei 453: <p>
1.103 tj 454:
1.37 dhartmei 455: <dt><i>802.11 Security</i>
456: <dd>by Bruce Potter and Bob Fleck
457: <dd>
458: Provides information on the fundamentals of wireless security, including
459: practical solutions for setting up clients, access points and gateways
460: under several operating systems. Two chapters are dedicated to OpenBSD 3.1,
461: covering wi, bridge, pf and altq.
1.25 chris 462: </dl>
1.21 chris 463:
1.25 chris 464: <hr>
1.91 deraadt 465: <h3>Cryptography</h3>
1.21 chris 466: <dl>
467: <dt><i>Applied Cryptography: Protocols, Algorithms, and Source Code in C</i>
468: <dd>by Bruce Schneier
469: <dd>
470: A comprehensive explanation of Cryptography, with information
471: about its history, protocols, and algorithms. This book is a great
472: introduction to cryptography, with the necessary basics
473: to understand the field. Also, it has a very extensive reference section.
1.36 jufi 474: <br>
475: <p>
1.103 tj 476:
1.30 jsyn 477: <dt><i>Handbook of Applied Cryptography</i>
1.117 ! deraadt 478: <dd>by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone
1.26 ian 479: <dd>A new and detailed look at Cryptography. The authors write:
480: <dd>
481: ... Public-key cryptographic techniques
482: are now in widespread use, especially in the financial services
483: industry, in the public sector, and by individuals for their personal
484: privacy, such as in electronic mail. This Handbook will serve as a
485: valuable reference for the novice as well as for the expert who
486: needs a wider scope of coverage within the area of cryptography.
487: It is a necessary and timely guide for professionals who practice
488: the art of cryptography.
1.117 ! deraadt 489: <dd>The entire book is
1.55 grunk 490: <a href="http://www.cacr.math.uwaterloo.ca/hac/">
1.26 ian 491: available for free downloading</a> (for personal use only)
492: from the book authors' site, in PDF or PostScript.
493: <dd>
494: <p>
1.103 tj 495:
1.25 chris 496: <dt><i>SSL and TLS Essentials: Securing the Web</i>
497: <dd>by Stephen A. Thomas
498: <dd>
499: This book offers introductory coverage of the SSL and TLS protocols, with
500: examples. The SSL protocol
501: is currently the basis of secure data transfer and secure transactions
502: on the Internet. Aside from encryption, this book also covers data
503: integrity and details the SSL protocol.
504: <dd>
505: <p>
1.103 tj 506:
1.39 jose 507: <dt><i>SSL and TLS: Designing and Building Secure Systems</i>
508: <dd>by Eric Rescorla
509: <dd>
510: This book offers comprehensive information about the SSL and TLS protocols,
511: covering their operation and security,
512: together with usage and implementation details.
513: There are also chapters about HTTP over SSL, and SMTP over TLS (STARTTLS).
1.116 bentley 514: Eric Rescorla is the author of <code>ssldump</code>, a utility that can be
1.39 jose 515: used to monitor SSL connections.
516: He has written several commercial and free SSL implementations.
517: <dd>
518: <p>
1.103 tj 519:
1.25 chris 520: <dt><i>Big Book of IPsec RFCs: Internet Security Architecture</i>
521: <dd>compiled by Pete Loshin
522: <dd>
1.54 nick 523: A complete reprint of the IPsec RFCs with an extensive index and
524: glossary.
1.25 chris 525: <dd>
1.15 philen 526: </dl>