This section describes a number of books that are useful as references or for further understanding of particular topics.
Albitz, Paul and Cricket Liu. DNS and BIND. Third Edition. Sebastopol, CA: O'Reilly and Associates, 1998.
This book provides an explanation of the details of how Internet name service works on Unix systems.
Albitz, Paul, Matt Larson, and Cricket Liu. DNS on Windows NT. Sebastopol, CA: O'Reilly and Associates, 1998.
This version of the book provides an explanation of the details of how Internet name service works on Windows NT.
Cheswick, Bill and Steve Bellovin. Firewalls and Internet Security. Reading, MA: Addison-Wesley, 1994.
This was the first book published on firewalls, describing the authors' experiences building a series of firewalls for AT&T Bell Labs. The book tends to be strong on theory and background but weak on implementation details; it tells you how they build firewalls, but you probably can't duplicate their tools and methods without the same kind of backing they have (AT&T Bell Labs). Even so, it's a classic in the field.
Comer, Douglas E. Internetworking with TCP/IP Volume I: Principles, Protocols, and Architecture. Third Edition. Englewood Cliffs, NJ: Prentice Hall, 1995.
This book provides a helpful introduction to the nuts and bolts of TCP/IP networking. It discusses the basics about what packets look like and how routing works, etc. Later volumes include introductions to some of the higher-level protocols such as SMTP and FTP.
Garfinkel, Simson. PGP : Pretty Good Privacy. Sebastopol, CA: O'Reilly & Associates, 1994.
This is an excellent guide to the very popular program, PGP, which lets you encrypt and apply digital signatures to your messages. In addition to technical details, it contains the fascinating, behind-the-scenes stories of Phil Zimmermann's development of PGP, electronic privacy, and cryptography export and patents in the United States.
Garfinkel, Simson and Gene Spafford. Practical UNIX & Internet Security. Second Edition. Sebastopol, CA: O'Reilly & Associates, 1996.
This is a very good guide to Unix host security. Simson Garfinkel is also the author of PGP: Pretty Good Privacy. Gene Spafford is now one of the principals of the CERIAS center at Purdue University.
Hunt, Craig. TCP/IP Network Administration. Second Edition. Sebastopol, CA: O'Reilly & Associates, 1998.
This book provides an excellent system administrator's overview of TCP/IP networking. It focuses on Unix systems and includes a very useful reference to major Unix networking services and tools such as BIND (the standard Unix DNS server) and Sendmail (the standard Unix SMTP server).
Hunt, Craig, and Robert Bruce Thompson. Windows NT TCP/IP Network Administration. Sebastopol, CA: O'Reilly & Associates, 1998.
This book provides an excellent system administrator's overview of TCP/IP networking. It focuses on Windows NT systems.
Nemeth, Evi, Garth Snyder, Scott Seebass, and Trent R. Hein. Unix System Administration Handbook. Second Edition. Englewood Cliffs, NJ: Prentice Hall, 1995.
This is the standard reference guide to practical Unix system administration issues. It includes good, real-world coverage of thorny issues like backups.
Schneier, Bruce. Applied Cryptography : Protocols, Algorithms, and Source Code in C. Second Edition. New York: John Wiley & Sons, 1995.
This is an extremely comprehensive book about cryptography algorithms and techniques. It covers the Data Encryption Standard (DES), the RSA algorithm, and all of the other private and public key algorithms, with mathematical details for all of them. Source code is available.
Stevens, Richard W. TCP/IP Illustrated, Volume 1: The Protocols. Reading, MA: Addison-Wesley, 1994.
This is a good guide to the nuts and bolts of TCP/IP networking. Its main strength is that it provides traces of the packets going back and forth as the protocols are actually in use and uses them to illustrate the discussions of the protocols.
Stoll, Cliff. The Cuckoo's Egg. Garden City, NJ: Doubleday, 1989.
This is a fascinating true story about a hunt for crackers on the Internet. It gives you an appreciation of the time and effort it takes to track an attack against your site, and it also includes a good chocolate chip cookie recipe.