Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

Buy

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable data communications and global computer networking. The underlying Internet Protocol (IP), Transmission Control Protocol, and User Datagram Protocol (UDP) are remarkably unchanged. But change has come in the way TCP/IP is used and how it is managed.

A clear symbol of this change is the fact that my mother-in-law has a TCP/IP network connection in her home that she uses to exchange electronic mail, compressed graphics, and hypertext documents with other senior citizens. She thinks of this as "just being on the Internet," but the truth is that her small system contains a functioning TCP/IP protocol stack, manages a dynamically assigned IP address, and handles data types that did not even exist a decade ago.

In 1991, TCP/IP was a tool of sophisticated users. Network administrators managed a limited number of systems and could count on the users for a certain level of technical knowledge. No more. In 2002, the need for highly trained network administrators is greater than ever because the user base is larger, more diverse, and less capable of handling technical problems on its own. This book provides the information needed to become an effective TCP/IP network administrator.

TCP/IP Network Administration was the first book of practical information for the professional TCP/IP network administrator, and it is still the best. Since the first edition was published there has been an explosion of books about TCP/IP and the Internet. Still, too few books concentrate on what a system administrator really needs to know about TCP/IP administration. Most books are either scholarly texts written from the point of view of the protocol designer, or instructions on how to use TCP/IP applications. All of those books lack the practical, detailed network information needed by the Unix system administrator. This book strives to focus on TCP/IP and Unix and to find the right balance of theory and practice.

I am proud of the earlier editions of TCP/IP Network Administration. In this edition, I have done everything I can to maintain the essential character of the book while making it better. Dynamic address assignment based on Dynamic Host Configuration Protocol (DHCP) is covered. The Domain Name System material has been updated to cover BIND 8 and, to a lesser extent, BIND 9. The email configuration is based on current version of sendmail 8, and the operating system examples are from the current versions of Solaris and Linux. The routing protocol coverage includes Routing Information Protocol version 2 (RIPv2), Open Shortest Path First (OSPF), and Border Gateway Protocol (BGP). I have also added a chapter on Apache web server configuration, new material on xinetd, and information about building a firewall with iptables. Despite the additional topics, the book has been kept to a reasonable length.

(HTML tags aren't allowed.)

IBM WebSphere Application Server v7.0 Security
IBM WebSphere Application Server v7.0 Security

IBM WebSphere Application Server Network Deployment is IBM's flagship J2EE application server platform. It implements the J2EE technology stack. This stack enables the WebSphere Application Server platform to execute the user's Java enterprise applications that perform business functions. There are several roles who use this platform...

Retailization: Brand Survival in the Age of Retailer Power
Retailization: Brand Survival in the Age of Retailer Power
Presents an innovative and pragmatic step-by-step process to help businesses rethink their brand efforts around the retail strategies that best meet the needs of today's shoppers. Illustrates how brand power is inexorably being replaced by retailer power. Based on a two-year study conducted by AC Nielsen and BBDO Europe --the largest global study...
Pearls of Functional Algorithm Design
Pearls of Functional Algorithm Design

Richard Bird takes a radically new approach to algorithm design, namely, design by calculation. These 30 short chapters each deal with a particular programming problem drawn from sources as diverse as games and puzzles, intriguing combinatorial tasks, and more familiar areas such as data compression and string matching. Each pearl starts with...


Practical UI Patterns for Design Systems: Fast-Track Interaction Design for a Seamless User Experience
Practical UI Patterns for Design Systems: Fast-Track Interaction Design for a Seamless User Experience

Understanding UI patterns is invaluable to anyone creating websites for the first time. It helps you make connections between which tools are right for which jobs, understand the processes, and think deeply about the context of a problem.  This is your concise guide to the tested and proven general mechanisms for solving...

Secure Computer and Network Systems: Modeling, Analysis and Design
Secure Computer and Network Systems: Modeling, Analysis and Design

Secure Computer and Network Systems

Modeling, Analysis and Design

Nong Ye, Arizona State University, USA

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by...

Java™ Performance Tuning, 2nd Edition
Java™ Performance Tuning, 2nd Edition
Java Peformance Tuning, 2nd edition provides a comprehensive and indispensable guide to eliminating all types of performance problems. Using many real-life examples to work through the tuning process in detail, JPT shows how tricks such as minimizing object creation and replacing strings with arrays can really pay...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy