| Title | Description |
Unix System Administration Handbook (3rd Edition) Evi Nemeth, Garth Snyder, Scott Seebass, Trent R. Hein (Prentice Hall 2001) | An excellent book on Unix system administration which covers Linux, FreeBSD, HP-UX and Solaris configurations. A must-have reference book for all Unix system administrators. |
Computer Networking: A Top-down Approach Featuring the Internet James F. Kurose, Keith W. Ross (Addison Wesley 2001) | This book utilizes the Internet as an example to illustrate the principles of computer networking. The top-down approach used in this book has made the material easier to understand. |
Maximum Linux Security (2nd Edition) Anonymous (Sams Publishing 2001) | This is a book written to discuss computer security issues from a hacker's perspective. It also suggests possible ways of defense. |
TCP/IP Unleashed Tim Parker, Mark Sportack (Sams Publishing 2000) | This book discusses TCP/IP and network services that run above it in a general way, without making reference to specific operating systems. It does not describe the protocols in detail, but can serve as a starting point for further investigation. |
Real World Linux Security: Intrusion Prevention, Detection and Recovery Bob Toxen (Prentice Hall 2001) | This book proposes a lot of scenarios where security may be compromised and possible ways of defense. Another book written from a hacker's perspective. |
Linux Firewalls (2nd Edition) Bob Ziegler (New Riders Publishing 2002) | Featuring an excellent coverage on iptables, the Linux firewall tool for kernel 2.4 and later. |
Network Security -- Private Communication in a Public World (2nd Edition) Charlie Kaufman, Radia Perlman, Mike Spencer (Prentice Hall 2002) | A comprehensive book on network security emphasising on algorithms and standards on cryptography and authentication. |