The Center for Education and Research in Information Assurance and Security, or CERIAS, is the world's foremost University center for multidisciplinary research and education in areas of information security. Our areas of research include computer, network, and communications security as well as information assurance.

This site's design is only visible in a graphical browser that supports web standards, but its content is accessible to any browser or Internet device. (Why?)

Center for Education and Research in Information Assurance and Security

Introduction

This site provides a list of resources associated with Unix System Administration. The list is divided into sections to make find the information easier. A portion of the information here is also available at the COAST Archive.

First, a selection of books and periodicals are presented. The books contain a wealth of information and are often a needed resource. The magazines present new developments in a timely manner.

Next, products and tools are presented. The products represent commercial offerings in this field. The tools are freely available with many available for download from the COAST Archive.

Mailing lists and newsgroups provide forums for both discussion and learning about the various tasks and compenents in system administration. Conferences produce an intense environment to see the latest in developments and products. For any question, it is always best to check the Frequently Asked Questions. A selection of World Wide Web sites which concern themselves with system administration are presented. Lastly, the credits are presented.


Books

System Administration

  • Frisch, Essential System Adminstration, Second Edition, O'Reilly & Associates, 1995
  • Henry and Graham, Solaris 2.X System Administrator's Guide, McGraw Hill, 1995
  • Nemeth, Snyder, Seabass, and Hein, Unix System Administration Handbook, Second Edition, Prentice Hall PTR, 1989
  • Parker, Linux System Administrator's Survival Guide, Sam's Publishing, 1996
  • Parkinson, Freeland, and McKay, Sunsoft Solaris 2.* for Managers and Administrators, Onward Press, 1995
  • Peek, O'Reilly, and Loukides, Unix Power Tools, O'Reilly & Associates, 1993
  • Reiss and Radin, Unix System Adminstration Guide, McGraw Hill, 1993
  • Stewart, Interactive UNIX A Guide for System Administrators, Prentice Hall PTR, 1995
  • Thomas and Farrow, Unix Administration Guide for System V, Prentic Hall PTR, 1989
  • Winsor, Solaris Advanced System Administrator's Guide, Ziff Davis Press, 1993
  • Vann, Essential SCO System Administration, Prentice Hall PTR, 1995

Networking

  • Bapat, Object-Oriented Network models for Architecture, Operations, and Management, Prentice Hall PTR, 1994
  • Bates, Wireless Networked Communications Concepts, Technology, and Implementation, Mc-Graw HIll, 1994
  • Bird, Token Ring Network Design, Addison-Wesley, 1994
  • Black, ATM:Foundation for Broadband Networks, Prentice Hall PTR, 1995
  • Black, Data Networks Concepts, Theory, and Practice, Prentice Hall, 1989
  • Black, Datalink Protocols, Prentice Hall PTR, 1993
  • Black, Frame Relay Networks second edition, Mc-Graw Hill, 1996
  • Black, Mobile and Wireless Networks, Prentice Hall PTR, 1996
  • Black, Network Management Standards second edition, Mc-Graw Hill, 1995
  • Bloomers, Practical Planning for Network Growth, Prentice Hall PTR, 1996
  • Boisseau, Demange, Munier, An Introduction to ATM Technology, International Thomson Publishing, 1995
  • Breyer, Riley, Switched and Fast Ethernet How it Works and How to Use it, Ziff-Davis Press, 1995
  • Burgard, Phillips, DOS<-->Unix Networking and Internetworking, John Wiley & Sons, 1994
  • Cohen, A Guide to Networking, Boyd & Fraser Publishing, 1995
  • Conner, Anderson, Networking the Desktop Cabling, Configuration, and Communications, Academic Press Professional, 1995
  • Corrigan, LAN Disaster Prevention and Recovery, Prentice Hall PTR, 1994
  • Costa, Planning and Designing High Speed Networkds Using 100VG-AnyLAN, Prentice Hall PTR, 1995
  • Feibel, The Network Press Encyclopedia of Networking second edition, Sybex, 1995
  • Fritz, Remote LAN Access A Guide for Networkers and the Rest of Us, Prentice Hall PTR, 1996
  • Geier, Wireless Networking Handbook, New Riders Publishing, 1996
  • Halsall, Data Communications Computer Networks and Open Systems fourth edition, Addison-Wesley, 1996
  • Händel, Huber, Schröder, ATM Networks Concepts, Protocols, Applications second edition, Addison-Wesley, 1995
  • Hegerling, Läpple, Ethernet Building a Communications Infrastructure, Addison-Wesley, 1993
  • Held, Lan Management with SNMP and RMON, Wiley Computer Publishing, 1996
  • Helds, Understand Data Communications fourth edition, Sams Publishing, 1994
  • Henry, De Libero, Strategic Networking from LAN and WAN to Information Superhighways, Internal Thomson Computer Press, 1996
  • Hines, ATM The Key to High-speed Broadband Networking, M&T Books, 1996
  • Hopkins, The ISDN Literacy Book, Addison-Wesley, 1995
  • Hunter, Local Area Networks Making the Right Choices, Addison-Wesley, 1993
  • Jain, FDDI Handbook High-speed Networking Using Fiber and Other Media, Addison-Wesley, 1994
  • Levy, Hartwig, Networking Fundamentals from Installation to Application, MISipress, 1995
  • Rose, The SIMPLE Book an Introduction to Networking Management, Prentice Hall PTR, 1996

Security

  • Arnold, Unix Security A Practical Tutorial, McGraw-Hill, 1993
  • Barrett, Bandits on the Information Superhighway, O'Reilly & Associates, 1996
  • Baker, Network Security How to Plan for it and Achieve it, McGraw-Hill, 1995
  • Bryant, Unix Security for the Organization, Sams Publishing, 1994
  • Cheswick, Bellovin, Firewalls and Internet Security, Addison-Wesley, 1994
  • Cobb, The NCSA Guide to PC and Lan Security, McGraw-Hill, 1996
  • Curry, Unix System Security, Addison-Wesley, 1992
  • Endrijonas, Data Security, Prima Publishing, 1995
  • Garfinkel, PGP: Pretty Good Privacy, O'Reilly & Associates, 1995
  • Garfinkel, Spafford, Practical UNIX Security & Internet Security, O'Reilly & Associates, 1996
  • Howard, Introduction to Internet Security, PRIMA, 1995
  • Icove, Seger, VonStorch, Computer Crime: A Crimefighter's Handbook, O'Reilly & Associates, 1995
  • Kabay, The NCSA Guide to Enterprise Security, McGraw-Hill, 1996
  • Kaufman, Perlman, Speciner, Network Security PRIVATE Communication in a PUBLIC World, Prentice Hall PTR, 1995
  • Russel, Gangeni, Computer Security Basics, O'Reilly & Associates, 1991
  • Simonds, Network Security Data and Voice Communications, McGraw-Hill, 1996
  • Stallings, Internet Security Handbook, IDG Books, 1995
  • Vacca, Internet Security Secrets, IDG Books, 1996
  • various authors, Internet Security Professional's Reference, New Riders Publishing, 1996

Magazines


Products

Backup Solutions

Monitoring Solutions

Other Solutions


Tools


Mailing Lists


Newsgroups


Conferences


Frequently Asked Questions (FAQ)

  • AIX Frequently Asked Questions
  • comp.sys.hp.hpux Frequently Asked Questions
  • comp.sys.sun.admin Frequently Asked Questions (link removed)
  • comp.unix.unixware Frequently Asked Questions (link removed)
  • Digital UNIX Frequently Asked Questions (link removed)
  • Linux Admin Frequently Asked Questions (link removed)
  • MachTen Frequently Asked Questions by Roger Joyce (link removed)
  • Minix Frequently Asked Questions (link removed)
  • NetBSD, FreeBSD, and 386BSD FAQ (link removed)(
  • Solaris 2 Frequently Asked Questions (link removed)
  • Sun-Managers Frequently Asked Questions (link removed)
  • SunOS 5.4 faq (link removed)
  • Unix Frequently Asked Questions

World Wide Web Sites


Credits for this resource