Media praise for TCP/IP Network Administration

"The TCP/IP protocols form the fundamental structure that connects most UNIX-based networks together. In particular, the international Internet network relies on TCP/IP for its communications.

"While the literature on UNIX is vast, one of the problems that always confronts systems administrators and managers sooner or later is that of connectivity, and specific guidance in this area is sparse.

"This book is designed to fill this gap...and does so very well indeed. Instead of merely giving a list of UNIX commands and functions to perform various tasks (which can be found in any UNIX systems reference), the book gives a comprehensive background of the technology and principles underlying TCP/IP before introducing the various UNIX utilities based on the system. This is of particular value to technically-oriented staff who would like to know a little more about what is actually going on....

"After a comprehensive and readable discussion of the basic technology, the book covers introductory topics such as 'Getting Started' and 'Basic Configuration,' which are invaluable for the absolute novice to TCP/IP. Configuaration of the interface is then covered together with a discussion on routing configuration. The routing information protocol (RIP) is discussed before introducing specific applications such as
sendmail, which is covered in detail.

"Communication networks are notorious for obscure problems, and the chapter on troubleshooting will be very userful to anyone involved in the maintenance of the network. Use of the ping command is covered, as well as the ifconfig and arp commands.

"Possibly of greatest importance in the modern world is the chapter on network security. With many large organizations including the academic, financial, commercial and military communities, relying more and more heavily on networked communications, security must be one of the paramount concerns in network design and administration. Too often,a brief dismissal of security is added as an afterthought. Mr. Hunt, however, offers a very useful and comphensive guide to security, starting from the planning stages of threat assessment and writing a security policy through to the details of day-to-day monitoring and assessment of security-related activity on the network. Use of the much-ignored
npasswd program is covered, a device that forces users not to use passwords that are easily guessed.

"Finally, a comprehensive set of technical appendices cover such topics as gated references, named references, sample sendmail configuration files, selected TCP/IP datagram headers and a command reference for passwd+.

"The book will find a wide readership within both the academic and commercial sectors. It covers the material comprehensively and in a very readable style. Much of the illustration relies on blocks of UNIX code which the newcomer may find rather frightening -- diagrams illustrating points are very few and far between! However, the only way to master the subject is by programming a network, and so the inevitable cannot be put off for ever.

"In summary, this is a very useful and readable additon to the literature."

--Dr. S.J. Shepherd, University of Bradford, UK, Book Review,
computer communications, October 1993