Book description
Discusses the evolution of WHOIS and how policy changes will affect WHOIS' place in IT today and in the future
This book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its forty-year history. Afterwards it examines how to use WHOIS and how WHOIS fits in the overall structure of the Domain Name System (DNS). Other technical topics covered include WHOIS query code and WHOIS server details. The book also discusses current policy developments and implementations, reviews critical policy documents, and explains how they will affect the future of the Internet and WHOIS. Additional resources and content updates will be provided through a supplementary website.
Includes an appendix with information on current and authoritative WHOIS services around the world
Provides illustrations of actual WHOIS records and screenshots of web-based WHOIS query interfaces with instructions for navigating them
Explains network dependencies and processes related to WHOIS utilizing flowcharts
Contains advanced coding for programmers
WHOIS Running the Internet: Protocol, Policy, and Privacy is written primarily for internet developers, policy developers, industry professionals in law enforcement, digital forensic investigators, and intellectual property attorneys.
Garth O. Bruen is an Internet policy and security researcher whose work has been published in the Wall Street Journal and the Washington Post. Since 2012 Garth Bruen has served as the North American At-Large Chair to the Internet Corporation of Assigned Names and Numbers (ICANN). In 2003 Bruen created KnujOn.com with his late father, Dr. Robert Bruen, to process and investigate Internet abuse complaints (SPAM) from consumers. Bruen has trained and advised law enforcement at the federal and local levels on malicious use of the Domain Name System in the way it relates to the WHOIS record system. He has presented multiple times to the High Technology Crime Investigation Association (HTCIA) as well as other cybercrime venues including the Anti-Phishing Working Group (APWG) and the National Center for Justice and the Rule of Law at The University of Mississippi School of Law. Bruen also teaches the Fisher College Criminal Justice School in Boston where he develops new approaches to digital crime.
Table of contents
- COVER
- TITLE PAGE
-
INTRODUCTION: WHAT IS WHOIS?
- I.1 CONVENTIONS USED IN THIS TEXT
- I.2 FLOW OF THIS TEXT
- I.3 WHOIS FROM VERSUS WHOIS ABOUT
- I.4 ORIGIN OF THE TERM WHOIS
- I.5 WHY WHOIS IS IMPORTANT (OR SHOULD BE) TO EVERYONE
- I.6 WHAT KIND OF USE AND CONTACT IS PERMITTED FOR WHOIS
- I.7 WHERE IS THE WHOIS DATA?
- I.8 IDENTIFYING REMOTE COMMUNICATION SOURCES
- I.9 GETTING DOCUMENTATION
-
1 THE HISTORY OF WHOIS
- 1.1 IN THE BEGINNING
- 1.2 THE SANDS OF TIME
- 1.3 1950s: ON THE WIRES AND IN THE AIR
- 1.4 1960s: SPARKING THE INTERNET TO LIFE
- 1.5 1970s: OK, NOW THAT WE HAVE AN INTERNET, HOW DO WE KEEP TRACK OF EVERYONE?
- 1.6 1980s: WHOIS GETS ITS OWN RFC
- 1.7 1990s: THE INTERNET AS WE KNOW IT EMERGES
- 1.8 2000s: WHOIS STANDARDS
- REFERENCES
- 2 USING WHOIS
- 3 RESEARCH AND INVESTIGATIONS
- 4 WHOIS IN THE DOMAIN NAME SYSTEM (DNS)
- 5 WHOIS CODE
- 6 WHOIS SERVERS
- 7 WHOIS POLICY ISSUES
- 8 THE FUTURE OF WHOIS
- APPENDIX A: WHOIS CODE
-
APPENDIX B: WHOIS SERVERS
- B.1 TOP-LEVEL INTERNET ORGANIZATIONAL WHOIS SERVERS
- B.2 RIR WHOIS SERVERS
- B.3 ADDITIONAL REGIONAL REGISTRAR WHOIS SERVERS
- B.4 INTERNET ROUTING REGISTRIES (IRR) WHOIS SERVERS
- B.5 gTLD REGISTRY WHOIS SERVERS
- B.6 .PRO SUBDOMAINS
- B.7 NEW gTLD WHOIS SERVERS LISTED IN 2013
- B.8 ccTLD WHOIS SERVERS
- B.9 AUTHORITATIVE gTLD REGISTRAR WHOIS SERVERS
- B.10 CENTRALNIC SUBDOMAINS
- B.11 ZANET SUBDOMAINS
- B.12 NONAUTHORITATIVE AND SPECIAL USE WHOIS SERVERS
- INDEX
- END USER LICENSE AGREEMENT
Product information
- Title: WHOIS Running the Internet: Protocol, Policy, and Privacy
- Author(s):
- Release date: November 2015
- Publisher(s): Wiley
- ISBN: 9781118679555
You might also like
book
The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules
The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules is a comprehensive manual …
book
Network Protocols for Security Professionals
Get to grips with network-based attacks and learn to defend your organization's network and network devices …
book
The Internet of Things: Key Applications and Protocols
An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 …
book
The Internet and Its Protocols
The view presented in The Internet and Its Protocols is at once broad and deep. It …