Alternative DNS Servers
by Jan-Piet Mens
Publisher: UIT Cambridge Ltd. 2009
ISBN/ASIN: 0954452992
ISBN-13: 9780954452995
Number of pages: 747
Description:
Providing a complete survey of DNS servers, this reference outlines the most suitable types of servers for varying scenarios. Addressing performance and security issues, this resource describes in detail the ideal scenarios for each server. Additional topics discussed include how DNS information can be stored in LDAP directories or SQL databases as well as how to construct robust DNS systems.
Download or read it online for free here:
Download link
(11MB, PDF)
Similar books
Data Communications
by Brian Brown
Contents: Cables and Network Communication Systems; The Public Telephone Switched Network; The Internet; Standards Organizations; Data Codes; Asynchronous and Synchronous Protocols; Bit Orientated Protocols; Modems; TCP/IP and Inter-Networking; etc.
(13212 views)
by Brian Brown
Contents: Cables and Network Communication Systems; The Public Telephone Switched Network; The Internet; Standards Organizations; Data Codes; Asynchronous and Synchronous Protocols; Bit Orientated Protocols; Modems; TCP/IP and Inter-Networking; etc.
(13212 views)
Introduction to Networking: How the Internet Works
by Charles Severance - net-intro.com
This book demystifies the amazing architecture and protocols of computers as they communicate over the Internet. The Internet operates on a few relatively simple concepts that anyone can understand. This book was written for everyone ...
(11436 views)
by Charles Severance - net-intro.com
This book demystifies the amazing architecture and protocols of computers as they communicate over the Internet. The Internet operates on a few relatively simple concepts that anyone can understand. This book was written for everyone ...
(11436 views)
Secrets of Network Cartography: A Comprehensive Guide to Nmap
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13173 views)
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13173 views)
Atlas of Cyberspace
by Martin Dodge, Rob Kitchin - Pearson Education
The authors show off a wide range of possibilities in representing the data existing on the Internet. Since so many of these models were created to display never-before-charted territories, the book is largely devoted to analyzing their accuracy.
(15124 views)
by Martin Dodge, Rob Kitchin - Pearson Education
The authors show off a wide range of possibilities in representing the data existing on the Internet. Since so many of these models were created to display never-before-charted territories, the book is largely devoted to analyzing their accuracy.
(15124 views)