small medium large xlarge

The latest version of the book is P1.0, released about 2 years ago. If you've bought a PDF of the book and would like to update it to this version (for free), visit your home page.

By default this page displays the errata for the latest version of the book. If you have a previous version, select it here:

If you've found a new error, please submit it.

  • Typo
  • Tech. error
  • Suggestion
  • Maybe next edition
  • Not a problem
  • Reported in: B1.0 (30-Aug-17)
PDF page: n/a
In discussing anti patterns, you note that library or package dependencies can lead to difficulties. Agreed. Or company has an explicit policy to min...more...
  • Reported in: B5.0 (28-Nov-17)
PDF page: 12
it was can be dangerous because calls cannot be made to time out. Should be it can be dangerous because calls cannot be made to time out.--Harri Jau...more...
  • Reported in: P1.0 (02-Apr-18)
PDF page: 33
"the database server" in the sentence "... because the driver will attempt to tell the database server to release resources associated with that state...more...
  • Reported in: P1.0 (15-Mar-19)
PDF page: 33
Reported by David Eisner, Page 33: "The feature common to all of these is that the connections outnumber the services. A butterfly style has 2N ...more...
  • Reported in: P1.0 (02-Apr-18)
PDF page: 35

There is no "retailer" in Chapter 1 as to the sentence "The retailer from Chapter 1, Living in Production, on page 1, ..."--Ben Wu

  • Reported in: P1.0 (15-Nov-18)
PDF page: 39
"The outermost frame is an Ethernet packet. The Ethernet packet contains an IP packet, which in turn contains a TCP packet. Finally, the payload of th...more...
  • Reported in: P1.0 (07-Apr-18)
PDF page: 51

"address routing protocol (ARP) " should be "address resolution protocol (ARP)".--Ben Wu

  • Reported in: P1.0 (04-Jul-18)
Paper page: 54
Ch4>Users>Sockets: Discussion of ephemeral ports for inbound connections is incorrect, thus so are the given socket limits. A client selects an epheme...more...
  • Reported in: P1.0 (28-Feb-18)
PDF page: 61
At the beginning of the third paragraph: Nearly all attacks vector in against the applications rather than the network gear. Should probably b...more...
  • Reported in: P1.0 (14-Jan-18)
PDF page: 68

Towards the end of paragraph 3:
"Here there be dragons." was probably meant to be either "Here be dragons" or "There be dragons".--Maximilian Karasz

  • Reported in: P1.0 (15-Jan-18)
PDF page: 171
Paper page: 162
In the box titled "Naming Configuration Properties", third sentence, you refer to "autumnal solstice". In the autumn (and spring as well) you have eq...more...
  • Reported in: B4.0 (18-Nov-17)
PDF page: 187
Paper page: 172
There seems to be the mismatch between IP addresses on the figure describing working of a DNS round-robin mechanism. In the figure the DNS server firs...more...
  • Reported in: P1.0 (17-Mar-18)
PDF page: 231
Under "The Principle of Least Privilege", phrase "This never includes running as root..." should likely be "This includes never running as root..." (...more...
  • Reported in: P1.0 (30-Mar-18)
PDF page: 263

At bottom of pg 263: "Postel's robustness principle". This is capitalized as "Postel's Robustness Principle" later in the book.--Michael Easter

  • Reported in: P1.0 (26-Sep-18)
PDF page: 290
Paper page: 286
The sentence " Since the site used only cookies for session tracking, not URL rewriting, all of our load test scripts used cookies." should read "Sinc...more...
  • Reported in: P1.0 (03-Apr-18)
PDF page: 307

Third paragraph, "That include configuration parameters." should be "That includes configuration parameters."--Michael Easter

  • Reported in: P1.0 (03-Apr-18)
PDF page: 318

Third paragraph, "just like dereferencing the point" should probably be "just like dereferencing the pointer".--Michael Easter

  • Reported in: P1.0 (31-Mar-18)
PDF page: 332
On the .mobi version, the past from Nora Jones, Introducing Chaos to Your Neighbors, is not indented as on the PDF version (at least when viewed on a ...more...