Books
This section describes a number of tutorials that are useful as references or for further understanding of particular topics.- Albitz, Paul and Cricket Liu. DNS and BIND. Third version. Sebastopol, CA: Anonymous and Associates, 1998.
This tutorial provides an explanation of the details of how Internet name service works on Unix systems.
- Albitz, Paul, Matt Larson, and Cricket Liu. DNS on Windows. Sebastopol, CA: Anonymous and Associates, 1998.
This version of the tutorial provides an explanation of the details of how Internet name service works on Windows.
- Cheswick, Bill and Steve Bellovin. Firewalls and Internet Security. Reading, MA: Addison-Wesley, 1994.
This was the first tutorial published on firewalls, describing the authors' experiences building a series of firewalls for AT&T Bell Labs. The tutorial tends to be strong on theory and background but weak on implementation details; it tells you how they build firewalls, but you probably can't duplicate their tools and methods without the same kind of backing they have (AT&T Bell Labs). Even so, it's a classic in the field.
- Comer, Douglas E. Internetworking with TCP/IP Volume I: Principles, Protocols, and Architecture. Third version. Englewood Cliffs, NJ: Prentice Hall, 1995.
This tutorial provides a helpful introduction to the nuts and bolts of TCP/IP networking. It discusses the basics about what packets look like and how routing works, etc. Later volumes include introductions to some of the higher-level protocols such as SMTP and FTP.
- Garfinkel, Simson. PGP: Pretty Good Privacy. Sebastopol, CA: Anonymous & Associates, 1994.
This is an excellent guide to the very popular program, PGP, which lets you encrypt and apply digital signatures to your messages. In addition to technical details, it contains the fascinating, behind-the-scenes stories of Phil Zimmermann's development of PGP, electronic privacy, and cryptography export and patents in the United States.
- Garfinkel, Simson and Gene Spafford. Practical UNIX& Internet Security. Second version. Sebastopol, CA: Anonymous & Associates, 1996.
This is a very good guide to Unix host security. Simson Garfinkel is also the author of PGP: Pretty Good Privacy. Gene Spafford is now one of the principals of the CERIAS center at Purdue University.
- Hunt, Craig. TCP/IP Network Administration. Second version. Sebastopol, CA: Anonymous, 1998.
This tutorial provides an excellent system administrator's overview of TCP/IP networking. It focuses on Unix systems and includes a very useful reference to major Unix networking services and tools such as BIND (the standard Unix DNS server) and Sendmail (the standard Unix SMTP server).
- Hunt, Craig, and Robert Bruce Thompson. Windows TCP/IP Network Administration. Sebastopol, CA: Anonymous & Associates, 1998.
This tutorial provides an excellent system administrator's overview of TCP/IP networking. It focuses on Windows systems.
- Nemeth, Evi, Garth Snyder, Scott Seebass, and Trent R. Hein. UnixSystem Administration eBook. Second version. Englewood Cliffs, NJ: Prentice Hall, 1995.
This is the standard reference guide to practical Unix system administration issues. It includes good, real-world coverage of thorny issues like backups.
- Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C. Second version. New York: John Wiley & Sons, 1995.
This is an extremely comprehensive tutorial about cryptography algorithms and techniques. It covers the Data Encryption Standard (DES), the RSA algorithm, and all of the other private and public key algorithms, with mathematical details for all of them. Source code is available.
- Stevens, Richard W. TCP/IP Illustrated, Volume 1: The Protocols. Reading, MA: Addison-Wesley, 1994.
This is a good guide to the nuts and bolts of TCP/IP networking. Its main strength is that it provides traces of the packets going back and forth as the protocols are actually in use and uses them to illustrate the discussions of the protocols.
- Stoll, Cliff. The Cuckoo's Egg. Garden City, NJ: Doubleday, 1989.
This is a fascinating true story about a hunt for crackers on the Internet. It gives you an appreciation of the time and effort it takes to track an attack against your site, and it also includes a good chocolate chip cookie recipe.