Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

Buy

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable data communications and global computer networking. The underlying Internet Protocol (IP), Transmission Control Protocol, and User Datagram Protocol (UDP) are remarkably unchanged. But change has come in the way TCP/IP is used and how it is managed.

A clear symbol of this change is the fact that my mother-in-law has a TCP/IP network connection in her home that she uses to exchange electronic mail, compressed graphics, and hypertext documents with other senior citizens. She thinks of this as "just being on the Internet," but the truth is that her small system contains a functioning TCP/IP protocol stack, manages a dynamically assigned IP address, and handles data types that did not even exist a decade ago.

In 1991, TCP/IP was a tool of sophisticated users. Network administrators managed a limited number of systems and could count on the users for a certain level of technical knowledge. No more. In 2002, the need for highly trained network administrators is greater than ever because the user base is larger, more diverse, and less capable of handling technical problems on its own. This book provides the information needed to become an effective TCP/IP network administrator.

TCP/IP Network Administration was the first book of practical information for the professional TCP/IP network administrator, and it is still the best. Since the first edition was published there has been an explosion of books about TCP/IP and the Internet. Still, too few books concentrate on what a system administrator really needs to know about TCP/IP administration. Most books are either scholarly texts written from the point of view of the protocol designer, or instructions on how to use TCP/IP applications. All of those books lack the practical, detailed network information needed by the Unix system administrator. This book strives to focus on TCP/IP and Unix and to find the right balance of theory and practice.

I am proud of the earlier editions of TCP/IP Network Administration. In this edition, I have done everything I can to maintain the essential character of the book while making it better. Dynamic address assignment based on Dynamic Host Configuration Protocol (DHCP) is covered. The Domain Name System material has been updated to cover BIND 8 and, to a lesser extent, BIND 9. The email configuration is based on current version of sendmail 8, and the operating system examples are from the current versions of Solaris and Linux. The routing protocol coverage includes Routing Information Protocol version 2 (RIPv2), Open Shortest Path First (OSPF), and Border Gateway Protocol (BGP). I have also added a chapter on Apache web server configuration, new material on xinetd, and information about building a firewall with iptables. Despite the additional topics, the book has been kept to a reasonable length.

(HTML tags aren't allowed.)

A Fire in the Wilderness: The First Battle Between Ulysses S. Grant and Robert E. Lee
A Fire in the Wilderness: The First Battle Between Ulysses S. Grant and Robert E. Lee
The riveting account of the first bloody showdown between Ulysses S. Grant and Robert E. Lee—a battle that sealed the fate of the Confederacy and changed the course of American history. 

In the spring of 1864, President Lincoln feared that he might not be able to save the Union. The Army of
...
Visual Basic .NET Unleashed
Visual Basic .NET Unleashed

Visual Basic.NET Unleashed is a complete book on the fundamentals of programming with a fully object-oriented language filled with new idioms and capabilities. In addition to the fundamentals, this book covers:

* Free threading and multithreading
* Inheritance
* Virtual methods and shared methods
* Structured exception
...

Scalable VoIP Mobility: Integration and Deployment
Scalable VoIP Mobility: Integration and Deployment
Today's businesses, big and small, are faced with the large scale restructuring concerning daily communications. Enterprises are moving from the standard wired telephony to wired and wireless communication via internet protocol (IP), Wi-Fi, and cellular services. With the stabilization of these networks and the availability of dual-mode handsets...

The Divine Ideas Tradition in Christian Mystical Theology
The Divine Ideas Tradition in Christian Mystical Theology
By the time of early modernity, a widely deployed tenet of Christian thought had begun to vanish. The divine ideas tradition, the teaching that all beings have an eternal existence as aspects of God's mind, had functioned across a wide range of central Christian doctrines, providing Christian
thinkers and mystical teachers with
...
MCSE Self-Paced Training Kit (Exam 70-297): Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure
MCSE Self-Paced Training Kit (Exam 70-297): Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure
Welcome to MCSE Self-Paced Training Kit (Exam 70-297): Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure. This book teaches you how to gather the network requirements for a business, how to analyze an existing network, and how to...
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
With the growing prevalence of the Internet, rootkit technology has taken center stage in the battle between White Hats and Black Hats. Adopting an approach that favors full disclosure, The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology. This book covers more topics, in greater depth, than any...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy