CDN$ 57.44
  • List Price: CDN$ 69.87
  • You Save: CDN$ 12.43 (18%)
Only 7 left in stock (more on the way).
Ships from and sold by Gift-wrap available.
DNS and BIND has been added to your Cart
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

DNS and BIND Paperback – Jun 5 2006

5 out of 5 stars 2 customer reviews

See all 5 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
"Please retry"
CDN$ 57.44
CDN$ 49.90 CDN$ 30.37

Save an Additional 10% on Textbooks When you Join Amazon Student

Special Offers and Product Promotions

  • Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)

Frequently Bought Together

  • DNS and BIND
  • +
  • DNS & Bind Cookbook
Total price: CDN$ 105.05
Buy the selected items together

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your e-mail address or mobile phone number.

Product Details

  • Paperback: 642 pages
  • Publisher: O'Reilly Media; Fifth Edition edition (June 5 2006)
  • Language: English
  • ISBN-10: 0596100574
  • ISBN-13: 978-0596100575
  • Product Dimensions: 17.8 x 3.3 x 23.3 cm
  • Shipping Weight: 862 g
  • Average Customer Review: 5.0 out of 5 stars 2 customer reviews
  • Amazon Bestsellers Rank: #197,600 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

About the Author

Cricket Liu graduated from the University of California, Berkeley, that great bastion of free speech, unencumbered Unix, and cheap pizza. He joined Hewlett-Packard after graduation and worked for HP for nine years.Cricket began managing the zone after the Loma Prieta earthquake forcibly transferred the zone's management from HP Labs to HP's Corporate Offices (by cracking a sprinkler main and flooding a Labs computer room). Cricket was for over three years, and then joined HP's Professional Services Organization to co-found HP's Internet Consulting Program.Cricket left HP in 1997 to form Acme Byte & Wire, a DNS consulting and training company, with his friend Matt Larson. Network Solutions acquired Acme in June 2000, and later the same day merged with VeriSign. Cricket worked for a year as Director of DNS Product Management for VeriSign Global Registry Services.Cricket joined Infoblox, a company that develops DNS and DHCP appliances, in March, 2003. He is currently their Vice President of Architecture.Cricket, his wife, Paige, their son, Walt, and daughter, Greta, live in California with their two Siberian Huskies, Annie and Dakota.

Paul Albitz is a software engineer at Hewlett-Packard. Paul earned a Bachelor of Science degree from the University of Wisconsin, LaCrosse, and a Master of Science degree from Purdue University.Paul worked on BIND for the HP-UX 7.0 and 8.0 releases. During this time he developed the tools used to run the domain. Since then Paul has worked on various HP products during his 19 year career: HP JetDirect software, HP OfficeJet fax firmware, HPPhoto web site, and HP Photosmart Premier software.Paul and his wife Katherine live in San Diego California with their two cats, Gracie and Tiffany.

Inside This Book

(Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

What Other Items Do Customers Buy After Viewing This Item?

Customer Reviews

5.0 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See both customer reviews
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback Verified Purchase
This is the manual for DNS and Bind, there is nothing else like it I have seen. Everything you need to know about DNS for the typical network admin.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback Verified Purchase
It was as expacted.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse

Most Helpful Customer Reviews on (beta) HASH(0xa86970cc) out of 5 stars 30 reviews
21 of 21 people found the following review helpful
HASH(0xa8308b10) out of 5 stars Most comprehensive book on DNS and Bind July 8 2006
By calvinnme - Published on
Format: Paperback
First off, the most recent edition of this book was published in May 2006, so all reviews prior to that are discussing previous editions of this book.

The domain name system or domain name server (DNS) is a system that stores and associates many types of information with domain names, but, most important, it translates the domain name (computer hostnames) to IP addresses. It also lists mail exchange servers accepting e-mail for each domain. In providing a worldwide keyword-based redirection service, DNS is an essential component of contemporary Internet use. DNS is most well-known for making it possible to attach easy-to-remember domain names to hard-to-remember IP addresses. BIND (Berkeley Internet Name Domain) is the most commonly used DNS server on the Internet, especially on Unix-like systems, where it is a de facto standard. A new version of BIND (BIND 9) was written from scratch in part to address the architectural difficulties with auditing the earlier BIND code bases, and also to support DNSSEC (DNS Security Extensions). Other important features of BIND 9 include: TSIG, DNS notify, nsupdate, IPv6, rndc flush, views, multiprocessor support, and an improved portability architecture. This book was written to address these changes.

DNS is being used for many more applications than in the past. With ENUM (electronic numbering), DNS is used by voice-over-IP gear. With SPF (the Sender Policy Framework), mailers look up information in DNS to check for mail spoofing. This makes DNS more critical than ever, and a target for hackers. To handle these additional applications and increased threats, DNS has had to be extended, adding cryptographic security, for example.

These topics and others are covered in the new edition of DNS and BIND. Security is therefore one of the topics that is deeply covered in this book. The previous editions of this book also described how to secure name servers, but most readers probably felt the likelihood of their name servers coming under attack was remote where today it is probably going to happen. There's been a recent spate of DNS amplification attacks reported in the news, therefore it is necessary for system administrators of Internet name servers to guard against these attacks by limiting access top recursion, which is covered in the chapter entitled "Security".

The new and fifth edition of this old standard covers BIND 9.3.2, the most recent release of the BIND 9 series, as well as BIND 8.4.7. Beginning with an introduction to DNS and what it does, the book guides administrators through all aspects of setting up, configuring, and working with the distributed host information database. Other topics include using MX records to route mail, subdividing domains, the DNS Security Extensions (DNSSEC) and Transaction Signatures (TSIG), dynamic updates, troubleshooting, and DNS programming using the resolver library and Perl's Net::DNS module. All of the programming examples in the book can be downloaded from the website of the latest edition of the book. Anyone who works with DNS regularly or wants to be more informed about the Internet and how it works will find this book useful. There are other books on this subject that are easier to read, but none that are as complete as this one. I highly recommend it. The following is the table of contents:

A Brief History of the Internet; On the Internet and Internets;
The Domain Name System, in a Nutshell; The History of BIND; Must I Use DNS?;

The Domain Namespace; The Internet Domain Namespace; Delegation; Nameservers and Zones; Resolvers; Resolution; Caching;

Chapter 3. WHERE DO I START?
Getting BIND; Choosing a Domain Name;

Our Zone; Setting Up Zone Data; Setting Up a BIND Configuration File; Abbreviations; Hostname Checking; Tools; Running a Primary Nameserver; Running a Slave Nameserver; Adding More Zones; What's Next? ;

MX Records;'s Mail Server; What's a Mail Exchanger, Again? ; The MX Algorithm; DNS and Email Authentication;

The Resolver; Resolver Configuration; Sample Resolver Configurations; Minimizing Pain and Suffering; Additional Configuration Files; The Windows XP Resolver;

Controlling the Nameserver; Updating Zone Datafiles; Organizing Your Files; Changing System File Locations; Logging; Keeping Everything Running Smoothly;

How Many Nameservers? ; Adding More Nameservers; Registering Nameservers; Changing TTLs; Planning for Disasters; Coping with Disaster;

Chapter 9. PARENTING
When to Become a Parent; How Many Children? ; What to Name Your Children; How to Become a Parent: Creating Subdomains; Subdomains of Domains; Good Parenting; Managing the Transition to Subdomains; The Life of a Parent;

Address Match Lists and ACLs; DNS Dynamic Update; DNS NOTIFY (Zone Change Notification); Incremental Zone Transfer (IXFR); Forwarding; Views; Round-Robin Load Distribution Nameserver; Address Sorting; Preferring Nameservers on Certain Networks; A Nonrecursive Nameserver; Avoiding a Bogus Nameserver; System Tuning; Compatibility; The ABCs of IPv6 Addressing; Addresses and Ports;

Chapter 11. SECURITY
TSIG; Securing Your Nameserver; DNS and Internet Firewalls; The DNS Security Extensions ;

Is nslookup a Good Tool? ;Interactive Versus Noninteractive; Option Settings; Avoiding the Search List; Common Tasks; Less Common Tasks; Troubleshooting nslookup Problems; Best of the Net; Using dig;

Debugging Levels; Turning On Debugging; Reading Debugging Output; The Resolver Search Algorithm and Negative Caching (BIND 8); The Resolver Search Algorithm and Negative; Caching (BIND 9); Tools;

Is NIS Really Your Problem? ; Troubleshooting Tools and Techniques; Potential Problem List; Transition Problems; Interoperability and Version Problems; TSIG Errors; Problem Symptoms;

Shell Script Programming with nslookup; C Programming with the Resolver Library Routines; Perl Programming with Net::DNS;

External, Authoritative DNS Infrastructure; Forwarder Infrastructure; Internal DNS Infrastructure; Operations; Keeping Up with DNS and BIND;

Using CNAME Records; Wildcards; A Limitation of MX Records; Dial-up Connections; Network Names and Numbers; Additional Resource Records; ENUM; Internationalized Domain Names; DNS and WINS; DNS, Windows, and Active Directory;

Master File Format; DNS Messages; Resource Record Data;
Instructions for BIND 8; Instructions for BIND 9
BIND Nameserver Boot File Directives and Configuration File Statements; BIND 8 Configuration File Statements; BIND 9 Configuration File Statements; BIND Resolver Statements
Section; BIND 9 Options Statement
3 of 3 people found the following review helpful
HASH(0xa8308b64) out of 5 stars Well Presented Concepts and Implementations (5th ed.) Aug. 22 2006
By Clint Pachl - Published on
Format: Paperback Verified Purchase
Foreword: I have been running my own DNS servers on OpenBSD and FreeBSD for about 4 years. All of my previous DNS knowledge was obtained from the man pages and online tutorials.

The book is great because the example network used throughout the book is built upon, showing you how to "grow" your DNS with your expanding network. The design and implementation presented is priceless and covers some of my favorite topics: placement of slaves, hidden primaries, building root servers, split views, daisy-chaining, forwarders, partial-slaves, address maintenance issues, etc. The pros and cons of each setup are weighed and best practices are suggested. If you like a generous helping of diagrams, examples, and tables as a learning aid, you won't be disappointed.

One specific example of weighing the pros and the cons is presented on page 479 as follows:

"Could we have saved a few bucks on hardware by using our external authoritative nameservers as forwarders, too? Sure, but that would have presented a risk." After that statement, they proceed into all the details of "why."

There is adequate coverage on security. The authors preach defense in depth. An implementation example includes hiding your masters and only exposing bastion slaves. Securing communications between the masters and slaves is also covered in the security chapter using DNSSEC and TSIG. I think IPSec is another way to add a security layer, but that is probably another book.

After reading the book, I started to implement my new DNS infrastructure and found myself referring to the index often. It is fairly consummate, however, I found a few things missing, such as the $GENERATE statement. Also, some of the configuration details were lacking slightly. For example, the order in which ACL elements are processed and how negated elements affect the processing outcome. Another question I had was, what would happen if an ACL name is negated, and what if that ACL contained some negated elements. Well I found my answer by actually trying it and verifying with the canonical reference docs on

I gave this book five stars because of its effectiveness in presenting the concepts and implementations of DNS using examples, good writing style, tables, and diagrams. If you're looking for the last 4 percent of the diminutive details of DNS, you will find it on
2 of 2 people found the following review helpful
HASH(0xa8308e40) out of 5 stars By far the best DNS introduction Aug. 7 2007
By Zarif Alimov - Published on
Format: Paperback
This book is the best investment I have made in my knowledge of DNS. I think any network admin should have this book on their desk at all times. It should become a bed side reading for anybody who is serious about TCP/IP protocols. DNS may be a pretty tricky topic to understand for many people. It uses both TCP and UDP for its queries and gets pretty convoluted as you dive into it. This books demystifies it very well. There is a very clear distinction between zones and domains. I have not seen that many materials clearly explaining the difference between the two. The book gives you a taste of what threats you may face running a DNS server. It explains how to perform zone transfers and zone delegations and clearly defines which suite of protocols is used to accomplish it.
This book can be a reference as well as a textbook read. I recommend it to all people out on the internet.
2 of 2 people found the following review helpful
HASH(0xa84fa384) out of 5 stars Great Resource Sept. 14 2007
By Marcus - Published on
Format: Paperback
This book is a good in-depth resource for anyone who wants a very comprehensive understanding of DNS hosting and troubleshooting. You can use it as a reference, reading sections as you need them, or read it cover to cover. I've opted for the former and am about half-way through. So, far I've read about things I've never been able to find good information for on the web. Keep up the good work!
2 of 2 people found the following review helpful
HASH(0xa84fa39c) out of 5 stars Excellent, which is why we need a new one... April 6 2010
By deir - Published on
Format: Paperback
This update had everything I needed to know and the release was well-timed. With issues around IPv6 becoming more crucial, BIND 9.7, and signing of the root in July to allow for a complete trust chain in DNSSEC implementations, it's time for a good update.