DNS and BIND and over one million other books are available for Amazon Kindle. Learn more

Vous voulez voir cette page en français ? Cliquez ici.


or
Sign in to turn on 1-Click ordering.
or
Amazon Prime Free Trial required. Sign up when you check out. Learn More
More Buying Choices
Have one to sell? Sell yours here
Start reading DNS and BIND on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

DNS and BIND [Paperback]

Cricket Liu , Paul Albitz
5.0 out of 5 stars  See all reviews (1 customer review)
List Price: CDN$ 57.99
Price: CDN$ 32.92 & FREE Shipping. Details
You Save: CDN$ 25.07 (43%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 4 left in stock (more on the way).
Ships from and sold by Amazon.ca. Gift-wrap available.
Want it delivered Tuesday, September 23? Choose One-Day Shipping at checkout.

Formats

Amazon Price New from Used from
Kindle Edition CDN $25.01  
Paperback CDN $32.92  
Save Up to 90% on Textbooks
Hit the books in Amazon.ca's Textbook Store and save up to 90% on used textbooks and 35% on new textbooks. Learn more.
Join Amazon Student in Canada


Book Description

June 5 2006 0596100574 978-0596100575 Fifth Edition

DNS and BIND tells you everything you need to work with one of the Internet's fundamental building blocks: the distributed host information database that's responsible for translating names into addresses, routing mail to its proper destination, and even listing phone numbers with the new ENUM standard. This book brings you up-to-date with the latest changes in this crucial service.

The fifth edition covers BIND 9.3.2, the most recent release of the BIND 9 series, as well as BIND 8.4.7. BIND 9.3.2 contains further improvements in security and IPv6 support, and important new features such as internationalized domain names, ENUM (electronic numbering), and SPF (the Sender Policy Framework).

Whether you're an administrator involved with DNS on a daily basis or a user who wants to be more informed about the Internet and how it works, you'll find that this book is essential reading.

Topics include:

  • What DNS does, how it works, and when you need to use it
  • How to find your own place in the Internet's namespace
  • Setting up name servers
  • Using MX records to route mail
  • Configuring hosts to use DNS name servers
  • Subdividing domains (parenting)
  • Securing your name server: restricting who can query your server, preventing unauthorized zone transfers, avoiding bogus servers, etc.
  • The DNS Security Extensions (DNSSEC) and Transaction Signatures (TSIG)
  • Mapping one name to several servers for load sharing
  • Dynamic updates, asynchronous notification of change to a zone, and incremental zone transfers
  • Troubleshooting: using nslookup and dig, reading debugging output, common problems
  • DNS programming using the resolver library and Perl's Net::DNS module

Special Offers and Product Promotions

  • Join Amazon Student in Canada


Frequently Bought Together

DNS and BIND + DNS & Bind Cookbook
Price For Both: CDN$ 59.22

One of these items ships sooner than the other.

  • DNS & Bind Cookbook CDN$ 26.30

Customers Who Bought This Item Also Bought


Product Details


Product Description

About the Author

Cricket Liu graduated from the University of California, Berkeley, that great bastion of free speech, unencumbered Unix, and cheap pizza. He joined Hewlett-Packard after graduation and worked for HP for nine years.Cricket began managing the hp.com zone after the Loma Prieta earthquake forcibly transferred the zone's management from HP Labs to HP's Corporate Offices (by cracking a sprinkler main and flooding a Labs computer room). Cricket was hostmaster@hp.com for over three years, and then joined HP's Professional Services Organization to co-found HP's Internet Consulting Program.Cricket left HP in 1997 to form Acme Byte & Wire, a DNS consulting and training company, with his friend Matt Larson. Network Solutions acquired Acme in June 2000, and later the same day merged with VeriSign. Cricket worked for a year as Director of DNS Product Management for VeriSign Global Registry Services.Cricket joined Infoblox, a company that develops DNS and DHCP appliances, in March, 2003. He is currently their Vice President of Architecture.Cricket, his wife, Paige, their son, Walt, and daughter, Greta, live in California with their two Siberian Huskies, Annie and Dakota.

Paul Albitz is a software engineer at Hewlett-Packard. Paul earned a Bachelor of Science degree from the University of Wisconsin, LaCrosse, and a Master of Science degree from Purdue University.Paul worked on BIND for the HP-UX 7.0 and 8.0 releases. During this time he developed the tools used to run the hp.com domain. Since then Paul has worked on various HP products during his 19 year career: HP JetDirect software, HP OfficeJet fax firmware, HPPhoto web site, and HP Photosmart Premier software.Paul and his wife Katherine live in San Diego California with their two cats, Gracie and Tiffany.


Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

4 star
0
3 star
0
2 star
0
1 star
0
5.0 out of 5 stars
5.0 out of 5 stars
Most helpful customer reviews
5.0 out of 5 stars The manual for DNS and Bind March 31 2014
Format:Paperback|Verified Purchase
This is the manual for DNS and Bind, there is nothing else like it I have seen. Everything you need to know about DNS for the typical network admin.
Was this review helpful to you?
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 4.7 out of 5 stars  22 reviews
18 of 18 people found the following review helpful
5.0 out of 5 stars Most comprehensive book on DNS and Bind July 8 2006
By calvinnme - Published on Amazon.com
Format:Paperback
First off, the most recent edition of this book was published in May 2006, so all reviews prior to that are discussing previous editions of this book.

The domain name system or domain name server (DNS) is a system that stores and associates many types of information with domain names, but, most important, it translates the domain name (computer hostnames) to IP addresses. It also lists mail exchange servers accepting e-mail for each domain. In providing a worldwide keyword-based redirection service, DNS is an essential component of contemporary Internet use. DNS is most well-known for making it possible to attach easy-to-remember domain names to hard-to-remember IP addresses. BIND (Berkeley Internet Name Domain) is the most commonly used DNS server on the Internet, especially on Unix-like systems, where it is a de facto standard. A new version of BIND (BIND 9) was written from scratch in part to address the architectural difficulties with auditing the earlier BIND code bases, and also to support DNSSEC (DNS Security Extensions). Other important features of BIND 9 include: TSIG, DNS notify, nsupdate, IPv6, rndc flush, views, multiprocessor support, and an improved portability architecture. This book was written to address these changes.

DNS is being used for many more applications than in the past. With ENUM (electronic numbering), DNS is used by voice-over-IP gear. With SPF (the Sender Policy Framework), mailers look up information in DNS to check for mail spoofing. This makes DNS more critical than ever, and a target for hackers. To handle these additional applications and increased threats, DNS has had to be extended, adding cryptographic security, for example.

These topics and others are covered in the new edition of DNS and BIND. Security is therefore one of the topics that is deeply covered in this book. The previous editions of this book also described how to secure name servers, but most readers probably felt the likelihood of their name servers coming under attack was remote where today it is probably going to happen. There's been a recent spate of DNS amplification attacks reported in the news, therefore it is necessary for system administrators of Internet name servers to guard against these attacks by limiting access top recursion, which is covered in the chapter entitled "Security".

The new and fifth edition of this old standard covers BIND 9.3.2, the most recent release of the BIND 9 series, as well as BIND 8.4.7. Beginning with an introduction to DNS and what it does, the book guides administrators through all aspects of setting up, configuring, and working with the distributed host information database. Other topics include using MX records to route mail, subdividing domains, the DNS Security Extensions (DNSSEC) and Transaction Signatures (TSIG), dynamic updates, troubleshooting, and DNS programming using the resolver library and Perl's Net::DNS module. All of the programming examples in the book can be downloaded from the website of the latest edition of the book. Anyone who works with DNS regularly or wants to be more informed about the Internet and how it works will find this book useful. There are other books on this subject that are easier to read, but none that are as complete as this one. I highly recommend it. The following is the table of contents:

Chapter 1. BACKGROUND
A Brief History of the Internet; On the Internet and Internets;
The Domain Name System, in a Nutshell; The History of BIND; Must I Use DNS?;

Chapter 2. HOW DOES DNS WORK?
The Domain Namespace; The Internet Domain Namespace; Delegation; Nameservers and Zones; Resolvers; Resolution; Caching;

Chapter 3. WHERE DO I START?
Getting BIND; Choosing a Domain Name;

Chapter 4. SETTING UP BIND
Our Zone; Setting Up Zone Data; Setting Up a BIND Configuration File; Abbreviations; Hostname Checking; Tools; Running a Primary Nameserver; Running a Slave Nameserver; Adding More Zones; What's Next? ;

Chapter 5. DNS AND ELECTRONIC MAIL
MX Records; Movie.edu's Mail Server; What's a Mail Exchanger, Again? ; The MX Algorithm; DNS and Email Authentication;

Chapter 6. CONFIGURING HOSTS
The Resolver; Resolver Configuration; Sample Resolver Configurations; Minimizing Pain and Suffering; Additional Configuration Files; The Windows XP Resolver;

Chapter 7. MAINTAINING BIND
Controlling the Nameserver; Updating Zone Datafiles; Organizing Your Files; Changing System File Locations; Logging; Keeping Everything Running Smoothly;

Chapter 8. GROWING YOUR DOMAIN
How Many Nameservers? ; Adding More Nameservers; Registering Nameservers; Changing TTLs; Planning for Disasters; Coping with Disaster;

Chapter 9. PARENTING
When to Become a Parent; How Many Children? ; What to Name Your Children; How to Become a Parent: Creating Subdomains; Subdomains of Domains; Good Parenting; Managing the Transition to Subdomains; The Life of a Parent;

Chapter 10. ADVANCED FEATURES
Address Match Lists and ACLs; DNS Dynamic Update; DNS NOTIFY (Zone Change Notification); Incremental Zone Transfer (IXFR); Forwarding; Views; Round-Robin Load Distribution Nameserver; Address Sorting; Preferring Nameservers on Certain Networks; A Nonrecursive Nameserver; Avoiding a Bogus Nameserver; System Tuning; Compatibility; The ABCs of IPv6 Addressing; Addresses and Ports;

Chapter 11. SECURITY
TSIG; Securing Your Nameserver; DNS and Internet Firewalls; The DNS Security Extensions ;

Chapter 12. NSLOOKUP AND DIG
Is nslookup a Good Tool? ;Interactive Versus Noninteractive; Option Settings; Avoiding the Search List; Common Tasks; Less Common Tasks; Troubleshooting nslookup Problems; Best of the Net; Using dig;

Chapter 13. READING BIND DEBUGGING OUTPUT
Debugging Levels; Turning On Debugging; Reading Debugging Output; The Resolver Search Algorithm and Negative Caching (BIND 8); The Resolver Search Algorithm and Negative; Caching (BIND 9); Tools;

Chapter 14. TROUBLESHOOTING DNS AND BIND
Is NIS Really Your Problem? ; Troubleshooting Tools and Techniques; Potential Problem List; Transition Problems; Interoperability and Version Problems; TSIG Errors; Problem Symptoms;

Chapter 15. PROGRAMMING WITH THE RESOLVER AND NAMESERVER LIBRARY ROUTINES
Shell Script Programming with nslookup; C Programming with the Resolver Library Routines; Perl Programming with Net::DNS;

Chapter 16. ARCHITECTURE
External, Authoritative DNS Infrastructure; Forwarder Infrastructure; Internal DNS Infrastructure; Operations; Keeping Up with DNS and BIND;

Chapter 17. MISCELLANEOUS
Using CNAME Records; Wildcards; A Limitation of MX Records; Dial-up Connections; Network Names and Numbers; Additional Resource Records; ENUM; Internationalized Domain Names; DNS and WINS; DNS, Windows, and Active Directory;

APPENDIX A- DNS MESSAGE FORMAT AND RESOURCE RECORDS
Master File Format; DNS Messages; Resource Record Data;
APPENDIX B- BIND COMPATIBILITY MATRIX
APPENDIX C- COMPILING AND INSTALLING BIND ON LINUX
Instructions for BIND 8; Instructions for BIND 9
APPENDIX D- TOP LEVEL DOMAINS
APPENDIX E- BIND NAMESERVER AND RESOLVER CONFIGURATION
BIND Nameserver Boot File Directives and Configuration File Statements; BIND 8 Configuration File Statements; BIND 9 Configuration File Statements; BIND Resolver Statements
Section; BIND 9 Options Statement
2 of 2 people found the following review helpful
5.0 out of 5 stars Well Presented Concepts and Implementations (5th ed.) Aug. 22 2006
By Clint Pachl - Published on Amazon.com
Format:Paperback|Verified Purchase
Foreword: I have been running my own DNS servers on OpenBSD and FreeBSD for about 4 years. All of my previous DNS knowledge was obtained from the man pages and online tutorials.

The book is great because the example network used throughout the book is built upon, showing you how to "grow" your DNS with your expanding network. The design and implementation presented is priceless and covers some of my favorite topics: placement of slaves, hidden primaries, building root servers, split views, daisy-chaining, forwarders, partial-slaves, address maintenance issues, etc. The pros and cons of each setup are weighed and best practices are suggested. If you like a generous helping of diagrams, examples, and tables as a learning aid, you won't be disappointed.

One specific example of weighing the pros and the cons is presented on page 479 as follows:

"Could we have saved a few bucks on hardware by using our external authoritative nameservers as forwarders, too? Sure, but that would have presented a risk." After that statement, they proceed into all the details of "why."

There is adequate coverage on security. The authors preach defense in depth. An implementation example includes hiding your masters and only exposing bastion slaves. Securing communications between the masters and slaves is also covered in the security chapter using DNSSEC and TSIG. I think IPSec is another way to add a security layer, but that is probably another book.

After reading the book, I started to implement my new DNS infrastructure and found myself referring to the index often. It is fairly consummate, however, I found a few things missing, such as the $GENERATE statement. Also, some of the configuration details were lacking slightly. For example, the order in which ACL elements are processed and how negated elements affect the processing outcome. Another question I had was, what would happen if an ACL name is negated, and what if that ACL contained some negated elements. Well I found my answer by actually trying it and verifying with the canonical reference docs on isc.org.

I gave this book five stars because of its effectiveness in presenting the concepts and implementations of DNS using examples, good writing style, tables, and diagrams. If you're looking for the last 4 percent of the diminutive details of DNS, you will find it on isc.org.
2 of 2 people found the following review helpful
5.0 out of 5 stars Excellent, which is why we need a new one... April 6 2010
By deir - Published on Amazon.com
Format:Paperback
This update had everything I needed to know and the release was well-timed. With issues around IPv6 becoming more crucial, BIND 9.7, and signing of the root in July to allow for a complete trust chain in DNSSEC implementations, it's time for a good update.
2 of 2 people found the following review helpful
5.0 out of 5 stars Great Resource Sept. 14 2007
By Marcus - Published on Amazon.com
Format:Paperback
This book is a good in-depth resource for anyone who wants a very comprehensive understanding of DNS hosting and troubleshooting. You can use it as a reference, reading sections as you need them, or read it cover to cover. I've opted for the former and am about half-way through. So, far I've read about things I've never been able to find good information for on the web. Keep up the good work!
1 of 1 people found the following review helpful
5.0 out of 5 stars By far the best DNS introduction Aug. 7 2007
By zchimp - Published on Amazon.com
Format:Paperback
This book is the best investment I have made in my knowledge of DNS. I think any network admin should have this book on their desk at all times. It should become a bed side reading for anybody who is serious about TCP/IP protocols. DNS may be a pretty tricky topic to understand for many people. It uses both TCP and UDP for its queries and gets pretty convoluted as you dive into it. This books demystifies it very well. There is a very clear distinction between zones and domains. I have not seen that many materials clearly explaining the difference between the two. The book gives you a taste of what threats you may face running a DNS server. It explains how to perform zone transfers and zone delegations and clearly defines which suite of protocols is used to accomplish it.
This book can be a reference as well as a textbook read. I recommend it to all people out on the internet.
Search Customer Reviews
Only search this product's reviews

Look for similar items by category


Feedback