Recommended by OpenBSD Public

Created and curated by rmicielski

  1. rmicielski says:

    The first sentence of this book is "This is a book about building the network you need." Taking it from there, Peter walks you through the whys and the hows of building the high performance, low maintenance network you need, using OpenBSD tools.

  2. SSH Mastery by 

    5 stars

    The seminal text on SSH, newly revised and updated!

    Secure Shell (SSH) lets sysadmins securely manage remote systems. It’s powerful, …

    rmicielski says:

    A guide to what you need to know about SSH. This book will help you eliminate passwords on your network, tunnel unencrypted protocols through secure channels, build VPNs with OpenSSH, and more. Focuses on the OpenSSH server, the OpenSSH client, and the PuTTY client.

  3. rmicielski says:

    Michael W. Lucas brings us the long anticipated second edition of his wildly successful book about using OpenBSD. This book covers all aspects of the OpenBSD system for new UNIX and BSD users alike.

  4. rmicielski says:

    At 549 pages plus an index, this book must be considered comprehensive. McKusick, Bostic and Karels are well known as prime movers at Berkeley CSRG (Computer Systems Research Group) during the 4.3/4.4BSD period.

  5. rmicielski says:

    This book is now in its third edition. It discusses hundreds of neat tricks, little-known techniques, and add-on utilities. Be aware that many of the utilities are either included with OpenBSD or, more commonly, are already available as ports or packages.

  6. Unix and Linux System Administration Handbook by , , , and 2 others

    5 stars

    UNIX and Linux System Administration Handbook, Fifth Edition is today’s definitive guide to installing, configuring and maintaining any Unix or …

    rmicielski says:

    This is an excellent book on Unix system administration.

  7. rmicielski says:

    This book covers many fundamental tasks in system administration. It includes examples for a wide range of Unix operating systems, including BSD.

  8. UNIX systems for modern architectures by  (Addison-Wesley professional computing series)

    No rating

    rmicielski says:

    This book leads its reader through all the low-level kernel models for multi-processing architectures.

  9. Lions' Commentary on UNIX 6th Edition with Source Code by 

    No rating

    A Commentary on the UNIX Operating System by John Lions (later reissued as Lions' Commentary on UNIX 6th Edition) is …

    rmicielski says:

    Although the UNIX described in this book is to BSD as a Model T Ford is to a 70's Mustang or Thunderbird, UNIX inventor Ken Thompson claims that "After 20 years, this is still the best exposition of the workings of a 'real' operating system."

  10. The Practice of Programming (Addison-Wesley Professional Computing Series) by ,

    4 stars

    A compendium of practical matters of importance to working programmers.

    rmicielski says:

    Brian Kernighan had a hand in two other books which we recommend even though they're not UNIX specific, but are useful to programmers on UNIX and elsewhere. This book covers practical programming considerations for C, C++ and Java. Highly recommended.

  11. rmicielski says:

    This book is similar to The Practice of Programming, but older. The examples are given in Fortran and PL/I.

  12. The C Programming Language by , ,

    4 stars

    This updated edition covers ANSI C.

    The authors present the complete guide to ANSI standard C language programming. Written by …

    rmicielski says:

    This is a clear and concise guide to the C programming language, perhaps the only one you will ever need. It focuses strictly on the C language, not how to use your compiler or anything else.

  13. rmicielski says:

    Covers code auditing, design and operational review, types of vulnerabilities, privilege models, signals, interprocess communication, synchronization, networking and more. Lots of examples and real world code snippets.

  14. rmicielski says:

    DNS is one of the oldest protocols on the Internet, and was designed for a network without hostile users. Anyone who wants to break into a network starts by investigating the target's Domain Name Service.

  15. rmicielski says:

    The Definitive Guide. OpenSSH is covered in detail.

Sort List

Embed this list on a website