Commencez à lire DNS and BIND sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.
DNS and BIND
 
Agrandissez cette image
 

DNS and BIND [Format Kindle]

Cricket Liu , Paul Albitz
3.5 étoiles sur 5  Voir tous les commentaires (2 commentaires client)

Prix conseillé : EUR 30,89 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 51,20
Prix Kindle : EUR 21,62 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 29,58 (58%)

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 21,62  
Broché EUR 51,04  
Broché --  
Chaque jour, un ebook avec au moins 60% de réduction
Découvrez l'Offre Éclair Kindle et inscrivez-vous à la Newsletter Offre Éclair Kindle pour ne rater aucun ebook à prix exceptionnel. Abonnez-vous dès maintenant




Les clients ayant consulté cet article ont également regardé


Descriptions du produit

Présentation de l'éditeur

DNS and BIND tells you everything you need to work with one of the Internet's fundamental building blocks: the distributed host information database that's responsible for translating names into addresses, routing mail to its proper destination, and even listing phone numbers with the new ENUM standard. This book brings you up-to-date with the latest changes in this crucial service.


The fifth edition covers BIND 9.3.2, the most recent release of the BIND 9 series, as well as BIND 8.4.7. BIND 9.3.2 contains further improvements in security and IPv6 support, and important new features such as internationalized domain names, ENUM (electronic numbering), and SPF (the Sender Policy Framework).


Whether you're an administrator involved with DNS on a daily basis or a user who wants to be more informed about the Internet and how it works, you'll find that this book is essential reading.


Topics include:

  • What DNS does, how it works, and when you need to use it
  • How to find your own place in the Internet's namespace
  • Setting up name servers
  • Using MX records to route mail
  • Configuring hosts to use DNS name servers
  • Subdividing domains (parenting)
  • Securing your name server: restricting who can query your server, preventing unauthorized zone transfers, avoiding bogus servers, etc.
  • The DNS Security Extensions (DNSSEC) and Transaction Signatures (TSIG)
  • Mapping one name to several servers for load sharing
  • Dynamic updates, asynchronous notification of change to a zone, and incremental zone transfers
  • Troubleshooting: using nslookup and dig, reading debugging output, common problems
  • DNS programming using the resolver library and Perl's Net::DNS module

Détails sur le produit


Commentaires en ligne 

4 étoiles
0
3 étoiles
0
1 étoiles
0
3.5 étoiles sur 5
3.5 étoiles sur 5
Commentaires client les plus utiles
2.0 étoiles sur 5 Obsolet !!! 7 mars 2014
Format:Broché
DNS and BIND de Cricket Liu a été LA référence pour la mise en place et gestion de serveurs de noms (DNS) pendant longtemps.

Malheureusement, ce livre n'a pas été mis à jour depuis cette edition de 2005. Si bien que les concepts de base de DNS n'ont pas beaucoup évolué, les extensions normalisées ainsi que les fonctionnalités des logiciels, oui, en particulier sur les aspects sécurité. DNSSEC, une fonctionalité essentielle des serveurs DNS actuels n'est même pas mentionné. IPv6 est traité dans les fonctionnalités avancés.

Bref, c'est bien dommage.
Avez-vous trouvé ce commentaire utile ?
0 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 DNS and BIND, 3ème édition 14 juin 2012
Format:Broché|Achat vérifié
Le DNS est peut-être le service Internet le plus utilisé: à chaque fois que vous envoyez un mail, à chaque fois que vous chargez une page web, le Domain Name System est impliqué.

Son rôle peut se résumer en quelques mots: c'est un annuaire qui fait la correspondance entre un nom d'hôte et une adresse IP. Mais se contenter de cette définition, c'est négliger la complexité de la bête. Complexité que l'on peut mesurer au nombre d'abréviations cabalistiques qui entrent en jeu dès qu'on s'y intéresse de plus près: A, AAAA, PTR, MX, SOA, TSIG, DNSSEC, ...

C'est la signification de ces termes, et bien plus, que vous découvrirez dans DNS and BIND. Pour ceux qui ne connaissent pas le DNS, les trois premiers chapitres serviront à planter le décor. En une cinquantaine de pages vous apprendrez:

* Quelles sont les origines du DNS?
* Comment fonctionne-t-il?
* Qu'est-ce qu'une Zone ou un Resolver?
* Quelle est la différence entre un Registry et un Registar?

Ensuite, à partir de chapitre 4, les choses sérieuses commenceront. D'abord avec l'installation de BIND 9. Puis dans les chapitres suivants avec la configuration des clients (Unix-like et Windows) ou la maintenance de votre serveur. Dès les premières pages de cette partie nous voici plongé dans les fichiers de zones. Mais les auteurs réussissent tout de même la prouesse de maintenir les choses claires tout au long du texte. Et le reste du livre sera dans la même veine. J'ajouterai tout de même une mention particulière pour le chapitre 6 "Security".
Lire la suite ›
Avez-vous trouvé ce commentaire utile ?
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.7 étoiles sur 5  22 commentaires
18 internautes sur 18 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Most comprehensive book on DNS and Bind 8 juillet 2006
Par calvinnme - Publié sur Amazon.com
Format:Broché
First off, the most recent edition of this book was published in May 2006, so all reviews prior to that are discussing previous editions of this book.

The domain name system or domain name server (DNS) is a system that stores and associates many types of information with domain names, but, most important, it translates the domain name (computer hostnames) to IP addresses. It also lists mail exchange servers accepting e-mail for each domain. In providing a worldwide keyword-based redirection service, DNS is an essential component of contemporary Internet use. DNS is most well-known for making it possible to attach easy-to-remember domain names to hard-to-remember IP addresses. BIND (Berkeley Internet Name Domain) is the most commonly used DNS server on the Internet, especially on Unix-like systems, where it is a de facto standard. A new version of BIND (BIND 9) was written from scratch in part to address the architectural difficulties with auditing the earlier BIND code bases, and also to support DNSSEC (DNS Security Extensions). Other important features of BIND 9 include: TSIG, DNS notify, nsupdate, IPv6, rndc flush, views, multiprocessor support, and an improved portability architecture. This book was written to address these changes.

DNS is being used for many more applications than in the past. With ENUM (electronic numbering), DNS is used by voice-over-IP gear. With SPF (the Sender Policy Framework), mailers look up information in DNS to check for mail spoofing. This makes DNS more critical than ever, and a target for hackers. To handle these additional applications and increased threats, DNS has had to be extended, adding cryptographic security, for example.

These topics and others are covered in the new edition of DNS and BIND. Security is therefore one of the topics that is deeply covered in this book. The previous editions of this book also described how to secure name servers, but most readers probably felt the likelihood of their name servers coming under attack was remote where today it is probably going to happen. There's been a recent spate of DNS amplification attacks reported in the news, therefore it is necessary for system administrators of Internet name servers to guard against these attacks by limiting access top recursion, which is covered in the chapter entitled "Security".

The new and fifth edition of this old standard covers BIND 9.3.2, the most recent release of the BIND 9 series, as well as BIND 8.4.7. Beginning with an introduction to DNS and what it does, the book guides administrators through all aspects of setting up, configuring, and working with the distributed host information database. Other topics include using MX records to route mail, subdividing domains, the DNS Security Extensions (DNSSEC) and Transaction Signatures (TSIG), dynamic updates, troubleshooting, and DNS programming using the resolver library and Perl's Net::DNS module. All of the programming examples in the book can be downloaded from the website of the latest edition of the book. Anyone who works with DNS regularly or wants to be more informed about the Internet and how it works will find this book useful. There are other books on this subject that are easier to read, but none that are as complete as this one. I highly recommend it. The following is the table of contents:

Chapter 1. BACKGROUND
A Brief History of the Internet; On the Internet and Internets;
The Domain Name System, in a Nutshell; The History of BIND; Must I Use DNS?;

Chapter 2. HOW DOES DNS WORK?
The Domain Namespace; The Internet Domain Namespace; Delegation; Nameservers and Zones; Resolvers; Resolution; Caching;

Chapter 3. WHERE DO I START?
Getting BIND; Choosing a Domain Name;

Chapter 4. SETTING UP BIND
Our Zone; Setting Up Zone Data; Setting Up a BIND Configuration File; Abbreviations; Hostname Checking; Tools; Running a Primary Nameserver; Running a Slave Nameserver; Adding More Zones; What's Next? ;

Chapter 5. DNS AND ELECTRONIC MAIL
MX Records; Movie.edu's Mail Server; What's a Mail Exchanger, Again? ; The MX Algorithm; DNS and Email Authentication;

Chapter 6. CONFIGURING HOSTS
The Resolver; Resolver Configuration; Sample Resolver Configurations; Minimizing Pain and Suffering; Additional Configuration Files; The Windows XP Resolver;

Chapter 7. MAINTAINING BIND
Controlling the Nameserver; Updating Zone Datafiles; Organizing Your Files; Changing System File Locations; Logging; Keeping Everything Running Smoothly;

Chapter 8. GROWING YOUR DOMAIN
How Many Nameservers? ; Adding More Nameservers; Registering Nameservers; Changing TTLs; Planning for Disasters; Coping with Disaster;

Chapter 9. PARENTING
When to Become a Parent; How Many Children? ; What to Name Your Children; How to Become a Parent: Creating Subdomains; Subdomains of Domains; Good Parenting; Managing the Transition to Subdomains; The Life of a Parent;

Chapter 10. ADVANCED FEATURES
Address Match Lists and ACLs; DNS Dynamic Update; DNS NOTIFY (Zone Change Notification); Incremental Zone Transfer (IXFR); Forwarding; Views; Round-Robin Load Distribution Nameserver; Address Sorting; Preferring Nameservers on Certain Networks; A Nonrecursive Nameserver; Avoiding a Bogus Nameserver; System Tuning; Compatibility; The ABCs of IPv6 Addressing; Addresses and Ports;

Chapter 11. SECURITY
TSIG; Securing Your Nameserver; DNS and Internet Firewalls; The DNS Security Extensions ;

Chapter 12. NSLOOKUP AND DIG
Is nslookup a Good Tool? ;Interactive Versus Noninteractive; Option Settings; Avoiding the Search List; Common Tasks; Less Common Tasks; Troubleshooting nslookup Problems; Best of the Net; Using dig;

Chapter 13. READING BIND DEBUGGING OUTPUT
Debugging Levels; Turning On Debugging; Reading Debugging Output; The Resolver Search Algorithm and Negative Caching (BIND 8); The Resolver Search Algorithm and Negative; Caching (BIND 9); Tools;

Chapter 14. TROUBLESHOOTING DNS AND BIND
Is NIS Really Your Problem? ; Troubleshooting Tools and Techniques; Potential Problem List; Transition Problems; Interoperability and Version Problems; TSIG Errors; Problem Symptoms;

Chapter 15. PROGRAMMING WITH THE RESOLVER AND NAMESERVER LIBRARY ROUTINES
Shell Script Programming with nslookup; C Programming with the Resolver Library Routines; Perl Programming with Net::DNS;

Chapter 16. ARCHITECTURE
External, Authoritative DNS Infrastructure; Forwarder Infrastructure; Internal DNS Infrastructure; Operations; Keeping Up with DNS and BIND;

Chapter 17. MISCELLANEOUS
Using CNAME Records; Wildcards; A Limitation of MX Records; Dial-up Connections; Network Names and Numbers; Additional Resource Records; ENUM; Internationalized Domain Names; DNS and WINS; DNS, Windows, and Active Directory;

APPENDIX A- DNS MESSAGE FORMAT AND RESOURCE RECORDS
Master File Format; DNS Messages; Resource Record Data;
APPENDIX B- BIND COMPATIBILITY MATRIX
APPENDIX C- COMPILING AND INSTALLING BIND ON LINUX
Instructions for BIND 8; Instructions for BIND 9
APPENDIX D- TOP LEVEL DOMAINS
APPENDIX E- BIND NAMESERVER AND RESOLVER CONFIGURATION
BIND Nameserver Boot File Directives and Configuration File Statements; BIND 8 Configuration File Statements; BIND 9 Configuration File Statements; BIND Resolver Statements
Section; BIND 9 Options Statement
2 internautes sur 2 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Well Presented Concepts and Implementations (5th ed.) 23 août 2006
Par Clint Pachl - Publié sur Amazon.com
Format:Broché|Achat vérifié
Foreword: I have been running my own DNS servers on OpenBSD and FreeBSD for about 4 years. All of my previous DNS knowledge was obtained from the man pages and online tutorials.

The book is great because the example network used throughout the book is built upon, showing you how to "grow" your DNS with your expanding network. The design and implementation presented is priceless and covers some of my favorite topics: placement of slaves, hidden primaries, building root servers, split views, daisy-chaining, forwarders, partial-slaves, address maintenance issues, etc. The pros and cons of each setup are weighed and best practices are suggested. If you like a generous helping of diagrams, examples, and tables as a learning aid, you won't be disappointed.

One specific example of weighing the pros and the cons is presented on page 479 as follows:

"Could we have saved a few bucks on hardware by using our external authoritative nameservers as forwarders, too? Sure, but that would have presented a risk." After that statement, they proceed into all the details of "why."

There is adequate coverage on security. The authors preach defense in depth. An implementation example includes hiding your masters and only exposing bastion slaves. Securing communications between the masters and slaves is also covered in the security chapter using DNSSEC and TSIG. I think IPSec is another way to add a security layer, but that is probably another book.

After reading the book, I started to implement my new DNS infrastructure and found myself referring to the index often. It is fairly consummate, however, I found a few things missing, such as the $GENERATE statement. Also, some of the configuration details were lacking slightly. For example, the order in which ACL elements are processed and how negated elements affect the processing outcome. Another question I had was, what would happen if an ACL name is negated, and what if that ACL contained some negated elements. Well I found my answer by actually trying it and verifying with the canonical reference docs on isc.org.

I gave this book five stars because of its effectiveness in presenting the concepts and implementations of DNS using examples, good writing style, tables, and diagrams. If you're looking for the last 4 percent of the diminutive details of DNS, you will find it on isc.org.
2 internautes sur 2 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Excellent, which is why we need a new one... 7 avril 2010
Par deir - Publié sur Amazon.com
Format:Broché
This update had everything I needed to know and the release was well-timed. With issues around IPv6 becoming more crucial, BIND 9.7, and signing of the root in July to allow for a complete trust chain in DNSSEC implementations, it's time for a good update.
2 internautes sur 2 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Great Resource 14 septembre 2007
Par Marcus - Publié sur Amazon.com
Format:Broché
This book is a good in-depth resource for anyone who wants a very comprehensive understanding of DNS hosting and troubleshooting. You can use it as a reference, reading sections as you need them, or read it cover to cover. I've opted for the former and am about half-way through. So, far I've read about things I've never been able to find good information for on the web. Keep up the good work!
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 By far the best DNS introduction 7 août 2007
Par Zarif Alimov - Publié sur Amazon.com
Format:Broché
This book is the best investment I have made in my knowledge of DNS. I think any network admin should have this book on their desk at all times. It should become a bed side reading for anybody who is serious about TCP/IP protocols. DNS may be a pretty tricky topic to understand for many people. It uses both TCP and UDP for its queries and gets pretty convoluted as you dive into it. This books demystifies it very well. There is a very clear distinction between zones and domains. I have not seen that many materials clearly explaining the difference between the two. The book gives you a taste of what threats you may face running a DNS server. It explains how to perform zone transfers and zone delegations and clearly defines which suite of protocols is used to accomplish it.
This book can be a reference as well as a textbook read. I recommend it to all people out on the internet.
Ces commentaires ont-ils été utiles ?   Dites-le-nous
Rechercher des commentaires
Rechercher uniquement parmi les commentaires portant sur ce produit

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique