Classic books to be read in Linux Network Programming

Source: Internet
Author: User

This article continues to introduce the classic Linux programming books in the previous article. This article focuses on some classic books related to network programming.

Linux Network Programming

The most classic book in Linux network programming is W. richard Stevens's "UNIX network programming", which consists of two books. The first book mainly describes the socket interfaces of network programming, at the same time, I also gave a detailed introduction to the network basic theories and protocols closely related to programming. This book also takes a lot of time to truly grasp it. At the same time, it is also a book that needs to be studied repeatedly, once you have integrated the knowledge and skills of this book, you will not be able to program on the Internet. I strongly recommend five-star products. If you miss it, you must regret it! The second book focuses on inter-process communication. We will not introduce it here.

UNIX Network Programming  
 
In
Dangdang |
Excellent View book details
 

Network Technology and Protocol

As a senior network developer, in addition to the socket interfaces provided by the system, you must also have basic network theoretical knowledge and network protocols, only in this way can we fully understand the operating principles of the network and make full use of the features provided to us by various networks or protocols in our programs, in the face of various problems in network programming, we can easily find out the problem. I would like to recommend several authoritative books in this regard. The first is "Computer Network". This is a classic tutorial from a foreign university. The book details the working principle of the bottom layer of the network, including the physical layer, data link layer, and network layer, after reading this book, you will understand how the network we are using is made up. You will understand how routers, switches, and TCP/IP work together.
And their respective important roles in the network. In the second set of books, we recommend "TCP/IP details" (three volumes in total. For details, see below). The author is also W. richard Steven S, ah, no way. His book is a classic, and he can't do it without recommendations. In the third set of books, we recommend "using TCP/IP for Internet connection" (three volumes in total, For details, see below). This set of books is also very classic, even w. richard Stevens has to admit that it is a classic book, and I prefer this book. After carefully studying the books recommended above, you can fully understand why SYN flood attacks exist and you can also write attack programs, you will also understand why even TCP can be hijacked and other advanced technologies. At this time, you should have reached the hacker level.

Computer Network TCP/IP (Volume 1: Protocol)
In
Dangdang |
Excellent View book details
In
Dangdang |
Excellent View book details
TCP/IP (Volume 2): implementation Details about TCP/IP 3: TCP Transaction Protocol, HTTP, nntp, and Unix domain Protocol
In
Dangdang | excellent in viewing details of this book
In
Dangdang | excellent in viewing details of this book
Using TCP/IP for Internet connection (1st volumes): Principles, protocols, and structures Interconnect Networks with TCP/IP (2nd volumes): design, implementation, and Kernel
In
Dangdang |
Excellent View book details
In
Dangdang |
Excellent View book details
Using TCP/IP for Internet interconnection (Volume 3): client-server programming and Applications  
 
In
Dangdang |
Excellent View book details
 

Computer and network security

Computer network security is a hot and controversial topic, but just like a boat, it depends on how you use it. As a senior Linux developer, you must understand this knowledge so that you can better avoid security vulnerabilities when designing and developing our software. There are still a lot of books in this regard, but I have not collected many classic books, so here I only recommend the "Guide to Unix and Internet security practices"

UNIX and Internet Security Practice Guide  
 
In
Dangdang |
Excellent View book details
 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.