The Networking CD Bookshelf


Book Description

More and more, technology professionals are relying on the Web, online help, and other online information sources to solve their tough problems. Now, with O'Reilly's ""Networking CD Bookshelf, Version 2.0, you can have the same convenient online access to your favorite O'Reilly books--all from your CD-ROM drive. We've packed seven of our best-selling guides onto this CD-ROM, giving you 4,016 pages of O'Reilly references and tutorials --fully searchable and cross-referenced, so you can search either the individual index for each book or the master index for the entire collection. Included are the complete, unabridged versions of these popular titles: ""TCP/IP Network Administration, 3rd Edition DNS & Bind, 4th Edition Building Internet Firewalls, 2nd Edition SSH, The Secure Shell: The Definitive Guide Network Troubleshooting Tools Managing NFS & NIS, 2nd Edition Essential SNMP As a bonus, you also get the new paperback version of ""TCP/IP Network Administration, 3rd Edition. Now it's easier than ever to find what you need to know about managing, administering, and protecting networks. This unique CD-ROM is a dream come true for network and system administrators--potent combination of books that offers unprecedented power and flexibility in this ever-expanding field. Formatted in HTML, ""The Networking CD Bookshelf, Version 2.0, can be accessed with any web browser, so you have a complete library of technical books that you can carry with you anywhere you need it. No other resource makes so much valuable information so easy to find and so convenient to use.







TCP/IP Network Administration


Book Description

"Covers Linux, Solaris, BSD, and System V TCP/IP implementations"--Back cover.




Virtual Private Networks


Book Description

Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization?The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution.This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH).New features in the second edition include SSH, which is a popular VPN solution for Unix systems, and an expanded description of the IPSec standard, for which several vendors have announced support.Topics include: How the VPN compares to other available networking technologies Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work Point to Point Tunneling Protocol (PPTP) and L2TP The Altavista Tunnel The Cisco PIX Firewall Secure Shell (SSH) Maintenance and troubleshooting




Essential SNMP


Book Description

A practical introduction to SNMP for system network administrators. Starts with the basics of SNMP, how it works and provides the technical background to use it effectively.




Managing Mailing Lists


Book Description

A variety of popular, platform-neutral tools are examined and used in an array of examples. An entire chapter is dedicated to Perl. Part tutorial, part reference manual. Department.




Exim: The Mail Transfer Agent


Book Description

Exim delivers electronic mail, both local and remote. It has all the virtues of a good postman: it's easy to talk to, reliable, efficient, and eager to accommodate even the most complex special requests. It's the default mail transport agent installed on some Linux systems, runs on many versions of Unix, and is suitable for any TCP/IP network with any combination of hosts and end-user mail software.Exim is growing in popularity because it is open source, scalable, and rich in features such as the following: Compatibility with the calling interfaces and options of Sendmail (for which Exim is usually a drop-in replacement) Lookups in LDAP servers, MySQL and PostgreSQL databases, and NIS or NIS+ services Support for many kinds of address parsing, including regular expressions that are compatible with Perl 5 Sophisticated error handling Innumerable tuning parameters for improving performance and handling enormous volumes of mail Best of all, Exim is easy to configure. You never have to deal with ruleset 3 or worry that a misplaced asterisk will cause an inadvertent mail bomb.While a basic configuration is easy to read and can be created quickly, Exim's syntax and behavior do get more subtle as you enter complicated areas like virtual hosting, filtering, and automatic replies. This book is a comprehensive survey that provides quick information for people in a hurry as well as thorough coverage of more advanced material.




Practical UNIX and Internet Security


Book Description

When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.




PGP: Pretty Good Privacy


Book Description

Pretty Good Privacy, or "PGP", is an encryption program widely available on the Internet. The program runs on MS-DOS, UNIX, and the Mac. PGP: Pretty Good Privacy offers both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy, explaining how to get PGP from publicly available sources and how to install it on various platforms.




Managing IP Networks with Cisco Routers


Book Description

The basics of IP networking. Network design part 1 & 2. Selecting network equipment. Routing protocol selection. Routing protocol configuration. The non-technical side of network management. The technical side of network management. Connecting to the outside world. Network security.