Proceedings of the 7th ACM conference on Computer and communications security
A new approach to DNS security (DNSSEC)
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
A web-based resource migration protocol using WebDAV
Proceedings of the 11th international conference on World Wide Web
YouServ: a web-hosting and content sharing tool for the masses
Proceedings of the 11th international conference on World Wide Web
Sys Admin - Networking
Auto-Discovery Capabilities for Service Management: An ISP Case Study
Journal of Network and Systems Management
IEEE Transactions on Knowledge and Data Engineering
Looking for Science in the Art of Network Measurement
IWDC '01 Proceedings of the Thyrrhenian International Workshop on Digital Communications: Evolutionary Trends of the Internet
Serving DNS Using a Peer-to-Peer Lookup Service
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
An overview of DNS-based server selections in content distribution networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Is your caching resolver polluting the internet?
Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality
Tenwen: The Reengineering of a Computing Environment
LISA '94 Proceedings of the 8th USENIX conference on System administration
SENDS, a Tool for Managing Domain Naming and Electronic Mail in a Large Organization
LISA '94 Proceedings of the 8th USENIX conference on System administration
On the responsiveness of DNS-based network control
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
How to Get There From Here: Scaling the Enterprise-Wide Mail Infrastructure
LISA '96 Proceedings of the 10th USENIX conference on System administration
Creating a Network for Lucent Bell Labs Research South
LISA '97 Proceedings of the 11th USENIX conference on System administration
NetReg: An Automated DHCP Registration System
LISA '99 Proceedings of the 13th USENIX conference on System administration
Nondeterministic Queries in a Relational Grid Information Service
Proceedings of the 2003 ACM/IEEE conference on Supercomputing
Architecture for an Artificial Immune System
Evolutionary Computation
Denial of Service against the Domain Name System
IEEE Security and Privacy
HostDB: the best Damn host2DNS/DHCP script ever written
LISA '05 Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19
TCLTK '98 Proceedings of the 3rd Annual USENIX Workshop on Tcl/Tk - Volume 3
Melange: creating a "functional" internet
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
Investigating prefix propagation through active BGP probing
Microprocessors & Microsystems
Locating data sources in large distributed systems
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
SEPADS'06 Proceedings of the 5th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems
Decentralized managing of replication objects in massively distributed systems
DaMaP '08 Proceedings of the 2008 international workshop on Data management in peer-to-peer systems
Risk assessment in practice: A real case study
Computer Communications
An autonomic ENUM implementation in network simulator-2
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
Bayesian bot detection based on DNS traffic similarity
Proceedings of the 2009 ACM symposium on Applied Computing
Automating trusted key rollover in DNSSEC
Journal of Computer Security
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
Enabling mobile networks through secure naming
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
A secure architecture for Australia's index based e-health environment
HIKM '10 Proceedings of the Fourth Australasian Workshop on Health Informatics and Knowledge Management - Volume 108
Efficient decision tree for protocol analysis in intrusion detection
International Journal of Security and Networks
PeerMon: a peer-to-peer network monitoring system
LISA'10 Proceedings of the 24th international conference on Large installation system administration
Security issues related with DNS dynamic updates for mobile nodes: a survey
Proceedings of the 8th International Conference on Frontiers of Information Technology
Investigating sequential patterns of DNS usage and its applications
ADMA'10 Proceedings of the 6th international conference on Advanced data mining and applications: Part I
Incident Response: Log management for effective incident response
Network Security
An implementation of the client-based distributed web caching system
APWeb'05 Proceedings of the 7th Asia-Pacific web conference on Web Technologies Research and Development
High reliability replication technique for web-server cluster systems
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part III
Algorithm for DNSSEC trusted key rollover
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Towards a scalable and flexible architecture for virtual private networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
GDS resource record: generalization ofthe delegation signer model
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Survey on DNS configurations, interdependencies, resilience and security for *.ke domains
Proceedings of the 2nd ACM Symposium on Computing for Development
MIWAI'11 Proceedings of the 5th international conference on Multi-Disciplinary Trends in Artificial Intelligence
Statistical cross-language Web content quality assessment
Knowledge-Based Systems
On modern DNS behavior and properties
ACM SIGCOMM Computer Communication Review
Hi-index | 0.00 |
From the Publisher:DNS and BIND is about one of the Internet's fundamental building blocks: the distributed host information database that's responsible for translating names into addresses, routing mail to its proper destination, and many other services. As the authors say in the preface, if you're using the Internet, you're already using DNSeven if you don't know it. This edition brings you up to date on the new 9.1.0 and 8.2.3 versions of BIND along with the older 4.9 version. There's also more extensive coverage of NOTIFY, IPv6 forward and reverse mapping, transaction signatures, and the new DNS Security Extensions; and a new section on accommodating Windows 2000 clients, servers and Domain Controllers. Whether you're an administrator involved daily with DNS or a user who wants to be more informed about the Internet and how it works, you'll find this book essential reading. Topics include: What DNS does, how it works, and when you need to use it How to find your own place in the Internet's name space Setting up name servers Using MX records to route mail Configuring hosts to use DNS name servers Subdividing domains (parenting) Securing your name server: restricting who can query your server, preventing unauthorized zone transfers, avoiding bogus name servers, etc. Mapping one name to several servers for load sharing Troubleshooting: using nslookup, reading debugging output, common problems DNS programming, using theresolver library and Perl's Net::DNS module