|
|
Featured Linux Networking Books
|
|
Linux IP Masquerade HOWTO
describes how to enable the Linux IP Masquerade feature on a given Linux
host. IP Masq is a form of Network Address Translation or NAT that allows
internally connected computers that do not have one or more registered
Internet IP addresses to have the ability to communicate to the Internet
via your Linux box's single Internet IP address.
|
|
The Linux Ethernet-HOWTO is a
compilation of information about which Ethernet devices can be used for
Linux, and how to set them up. This HOWTO is focused on the hardware and
low-level driver aspect of the Ethernet cards, and does not cover the
software end of things like ifconfig and route (this material is covered
in the Network HOWTO).
|
|
The Linux Networking-HOWTO
details important networking issues when using the popular Linux operating
system. Linux Networking-HOWTO includes: * informative background material
for newcomers * a generic discussion of networking issues *
technology-specific information grouped in three main sections: Ethernet
and IP-related information, technologies pertaining to widespread PC
hardware, and seldom-used technologies
|
|
In Setting Up a Linux
Intranet Server Visual Black Book, a team of authors and designers
brings the picture-intensive approach to Linux. It's a welcome move that
simultaneously heralds Linux's improving ease of use and the willingness
of the computing mainstream to investigate the operating system.
|
|
Taking up where Linux Clearly
Explained left off, Linux Networking Clearly Explained walks you through
the creation of a TCP/IP-based, Linux-driven local area network, beginning
with a sandbox installation involving just two or three computers.
|
|
A hands-on guide to implementing
Linux-based routers, walking through a series of production-routing
scenarios and offering detailed advice on configuration, problem
avoidance, and troubleshooting. Alongside configurations are general
discussions on running Linux production, as well as coverage of some
applications that help support the network infrastructure, such as traffic
analysis and system monitoring. Includes background information for new
network administrators
|
|
A hands-on guide to protecting
Linux data from security risks. Introduces readers to the seven deadly
sins of Linux security, showing how to set up firewalls, break in case
studies, block spam, develop internal security policies, and recover from
an intrusion quickly
|