98 Best Computer Networks Books of All Time

We've researched and ranked the best computer networks books in the world, based on recommendations from world experts, sales data, and millions of reader ratings. Learn more

Featuring recommendations from Lev Grossman, Andrew Chen, Seth Godin, and 8 other experts.
1

Computer Networks

For courses in computer networking or introductions to networking at both the undergraduate and graduate level in computer science, engineering, CIS, MIS, and business departments. In this revision, the author takes a structured approach to explaining how networks function. less

See more recommendations for this book...

2
Becoming a master of networking has never been easier

Whether you're in charge of a small network or a large network, Networking All-in-One is full of the information you'll need to set up a network and keep it functioning. Fully updated to capture the latest Windows 10 releases through Spring 2018, this is the comprehensive guide to setting up, managing, and securing a successful network.

Inside, nine minibooks cover essential, up-to-date information for networking in systems such as Windows 10 and Linux, as well as best practices for security, mobile and...
more

See more recommendations for this book...

3

Computer Networking

A Top-Down Approach

Building on the successful top-down approach of previous editions, the Fourth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts. With this edition, Kurose and Ross bring the issues of network security to the forefront, along with integration of the most current and relevant networking technologies.

Computer Networks and the Internet; Application Layer; Transport Layer; The Network Layer; The Link Layer...
more

See more recommendations for this book...

5
Considering that the history of the Internet is perhaps better documented internally than any other technological construct, it is remarkable how shadowy its origins have been to most people, including die-hard Net-denizens!

At last, Hafner and Lyon have written a well-researched story of the origins of the Internet substantiated by extensive interviews with its creators who delve into many interesting details such as the controversy surrounding the adoption of our now beloved "@" sign as the separator of usernames and machine addresses. Essential reading for anyone interested in the past...

more
Recommended by Lev Grossman, and 1 others.

Lev GrossmanIf you want to go all the way back, Janet Abbate’s Inventing The Internet really takes it all the way back to the Eisenhower administration and the very beginnings of electronic computers. (Source)

See more recommendations for this book...

6

Network Warrior

Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout.
more

See more recommendations for this book...

8
With 28 new chapters, the third edition of The Practice of System and Network Administration innovates yet again! Revised with thousands of updates and clarifications based on reader feedback, this new edition also incorporates DevOps strategies even for non-DevOps environments. Whether you use Linux, Unix, or Windows, this new edition describes the essential practices previously handed down only from mentor to protege. This wonderfully lucid, often funny cornucopia of information introduces beginners to advanced frameworks valuable for their entire career, yet is structured... more

See more recommendations for this book...

10
Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 6e, helps you prepare for professional certification -- and career success. The text fully maps to the new CompTIA Security+ SY0-501 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the fundamental essentials of network and computer security, the sixth edition includes expanded coverage of embedded device security, attacks and defenses, and new software tools to assess security. Practical,... more

See more recommendations for this book...

Don't have time to read the top Computer Networks books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
11
Distributed systems have become more fine-grained in the past 10 years, shifting from code-heavy monolithic applications to smaller, self-contained microservices. But developing these systems brings its own set of headaches. With lots of examples and practical advice, this book takes a holistic view of the topics that system architects and administrators must consider when building, managing, and evolving microservice architectures.

Microservice technologies are moving quickly. Author Sam Newman provides you with a firm grounding in the concepts while diving into current solutions...
more

See more recommendations for this book...

12
"TCP/IP Illustrated," an ongoing series covering the many facets of TCP/IP, brings a highly-effective visual approach to learning about this networking protocol suite. "TCP/IP Illustrated, Volume 2" contains a thorough explanation of how TCP/IP protocols are implemented. There isn't a more practical or up-to-date bookothis volume is the only one to cover the de facto standard implementation from the 4.4BSD-Lite release, the foundation for TCP/IP implementations run daily on hundreds of thousands of systems worldwide. Combining 500 illustrations with 15,000 lines of real, working code, "TCP/IP... more

See more recommendations for this book...

13
How prepared are you to build fast and efficient web applications? This eloquent book provides what every web developer should know about the network, from fundamental limitations that affect performance to major innovations for building even more powerful browser applications—including HTTP 2.0 and XHR improvements, Server-Sent Events (SSE), WebSocket, and WebRTC.

Author Ilya Grigorik, a web performance engineer at Google, demonstrates performance optimization best practices for TCP, UDP, and TLS protocols, and explains unique wireless and mobile network optimization requirements....
more

See more recommendations for this book...

14
This revised guide to Unix networking APIs updates coverage of programming standards and debugging techniques, and covers operating systems including Red Hat 9, Solaris 9, HP-UX, Free BSD 4.8/5.0, AIX 5.x and Mac OS X. less

See more recommendations for this book...

15

Incident Response & Computer Forensics

The definitive guide to incident response--updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methods behind--and remediation strategies for--today's most insidious attacks. more

See more recommendations for this book...

16
In an age of massive global surveillance, when last year's most advanced cyberwarfare weapons quickly migrate into every hacker's toolkit, you can no longer afford to rely on outdated security methods. If you care about privacy and security today, you need to step up your game -- especially if you're a sysadmin responsible for Internet-facing services. That means you need to master and use advanced security technologies like the TLS communications security protocol, PGP encryption, and the Tor anonymity network. Tools like these have often been viewed as too complex or mysterious for... more

See more recommendations for this book...

17
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.

Authors Evan Gilman and Doug Barth show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing...
more

See more recommendations for this book...

19
Time is a precious commodity, especially if you're a system administrator. No other job pulls people in so many directions at once. Users interrupt you constantly with requests, preventing you from getting anything done. Your managers want you to get long-term projects done but flood you with requests for quick-fixes that prevent you from ever getting to those long-term projects. But the pressure is on you to produce and it only increases with time. What do you do?

The answer is time management. And not just any time management theory--you want Time Management for System...
more

See more recommendations for this book...

Don't have time to read the top Computer Networks books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
21
Well-implemented interprocess communications (IPC) are key to the performance of virtually every non-trivial UNIX program. In "UNIX Network Programming, Volume 2, Second Edition," legendary UNIX expert W. Richard Stevens presents a comprehensive guide to every form of IPC, including message passing, synchronization, shared memory, and Remote Procedure Calls (RPC). less

See more recommendations for this book...

22
The "Cisco CCNA Command Guide" is the Complete Cisco CCNA Routing & Switching Command Guide for Passing your CCNA Exam.
A guide that will cover everything in Cisco Routing and Switching Command, including Subnetting, vlsm and Supernetting. You will be able pass your CCNA (Cisco Certified Networking Associate) exam and become a Cisco technology specialist sooner than you expected.
The book is structured on 4 modules, which are exactly the ones you need for CCNA. Every command you have to know is presented and explained here....
more

See more recommendations for this book...

23
Like sysadmins before them, network engineers are finding that they cannot do their work manually anymore. As the field faces new protocols, technologies, delivery models, and a pressing need for businesses to be more agile and flexible, network automation is becoming essential. This practical guide shows network engineers how to use a range of technologies and tools--including Linux, Python, JSON, and XML--to automate their systems through code.

Network programming and automation will help you simplify tasks involved in configuring, managing, and operating network equipment,...
more

See more recommendations for this book...

24
To complement the CompTIA Network+ Study Guide: Exam N10-007, 4e, and the CompTIA Network+ Deluxe Study Guide: Exam N10-007, 4e, look at CompTIA Network+ Practice Tests: Exam N10-007 (9781119432128).
Todd Lammle's bestselling CompTIA Network+ Study Guide for the N10-007 exam!


CompTIA's Network+ certification tells the world you have the skills to install, configure, and troubleshoot today's basic networking hardware peripherals and protocols. First, however, you have to pass the exam! This detailed CompTIA Authorized study guide by networking guru Todd Lammle...
more

See more recommendations for this book...

25
Master Modern Networking by Understanding and Solving Real Problems
Computer Networking Problems and Solutions offers a new approach to understanding networking that not only illuminates current systems but prepares readers for whatever comes next. Its problem-solving approach reveals why modern computer networks and protocols are designed as they are, by explaining the problems any protocol or system must overcome, considering common solutions, and showing how those solutions have been implemented in new and mature protocols.
Part I considers data...
more

See more recommendations for this book...

26
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.A Fully Revised Guide to Electronics Troubleshooting and Repair
Repair all kinds of electrical products, from modern digital gadgets to analog antiques, with help from this updated book. How to Diagnose and Fix Everything Electronic, Second Edition, offers expert insights, case studies, and step-by-step instruction from a lifelong electronics guru. Discover how to assemble your...
more

See more recommendations for this book...

27
Neural networks are getting smaller. Much smaller. The OK Google team, for example, has run machine learning models that are just 14 kilobytes in size--small enough to work on the digital signal processor in an Android phone. With this practical book, you'll learn about TensorFlow Lite for Microcontrollers, a miniscule machine learning library that allows you to run machine learning algorithms on tiny hardware.

Authors Pete Warden and Daniel Situnayake explain how you can train models that are small enough to fit into any environment, including small embedded devices that can run...
more

See more recommendations for this book...

28

TCP/IP Illustrated Volumes 1-3 Boxed Set

All three volumes of TCP/IP Illustrated in one handsome slipcase -- all at a great price Plus bonus poster -- W. Richard Stevens' classic TCP/IP guides -- all brought together for the first time

-- Master TCP/IP through clear explanations and actual data captured from live networks.

-- Added bonus Includes new data structures poster, exclusive with this boxed set.

Now, for the first time, all three volumes of W. Richard Stevens' classic TCP/IP Illustrated books have been brought together, at one special price. These books have become legends for their clear...
more

See more recommendations for this book...

29

Unix Network Programming

The leading book in its field, this guide focuses on the design, development and coding of network software under the UNIX operating system. Provides over 15,000 lines of C code with descriptions of how and why a given solution is achieved. For programmers seeking an indepth tutorial on sockets, transport level interface (TLI), interprocess communications (IPC) facilities under System V and BSD UNIX. less

See more recommendations for this book...

30
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Up-to-date, focused coverage of every topic on the CompTIA Network+ exam N10-007
Get on the fast track to becoming CompTIA Network+ certified with this affordable, portable study tool. Inside, certification training experts guide you through the official N10-007 exam objectives in the order that CompTIA presents them, providing a concise review...
more

See more recommendations for this book...

Don't have time to read the top Computer Networks books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
32
Terraform has become a key player in the DevOps world for defining, launching, and managing infrastructure as code (IaC) across a variety of cloud and virtualization platforms, including AWS, Google Cloud, Azure, and more. This hands-on second edition, expanded and thoroughly updated for Terraform version 0.12 and beyond, shows you the fastest way to get up and running.

Gruntwork cofounder Yevgeniy (Jim) Brikman walks you through code examples that demonstrate Terraform's simple, declarative programming language for deploying and managing infrastructure with a few commands. Veteran...
more

See more recommendations for this book...

33
The Internet Book, Fifth Edition explains how computers communicate, what the Internet is, how the Internet works, and what services the Internet offers. It is designed for readers who do not have a strong technical background -- early chapters clearly explain the terminology and concepts needed to understand all the services. It helps the reader to understand the technology behind the Internet, appreciate how the Internet can be used, and discover why people find it so exciting. In addition, it explains the origins of the Internet and shows the reader how... more

See more recommendations for this book...

34
Featured by Tableau as the first of "7 Books About Machine Learning for Beginners" Ready to crank up a virtual server and smash through petabytes of data? Want to add 'Machine Learning' to your LinkedIn profile?Well, hold on there...Before you embark on your epic journey into the world of machine learning, there is some theory and statistical principles to march through first. But rather than spend $30-$50 USD on a dense long textbook, you may want to read this book first. As a clear and concise alternative to a textbook, this book provides a practical and high-level introduction to... more

See more recommendations for this book...

36
Data Communications and Networking is designed to help students understand the basics of data communications and networking, and the protocols used in the Internet in particular by using the protocol layering of the Internet and TCP/IP protocol suite. Technologies related to data communication and networking may be the fastest growing in today's culture. The appearance of some new social networking applications is a testimony to this claim. In this Internet-oriented society, specialists need to be trained to run and manage the Internet, part of the Internet, or an organization's... more

See more recommendations for this book...

37
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM.

Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident...
more

See more recommendations for this book...

38
This book is designed for introductory one-semester or one-year courses in communications networks in upper-level undergraduate programs. The second half of the book can be used in more advanced courses. As pre-requisites the book assumes a general knowledge of computer systems and programming, and elementary calculus. The second edition expands on the success of the first edition by updating on technological changes in networks and responding to comprehensive market feedback. less

See more recommendations for this book...

39
It's easy enough to install Wireshark and begin capturing packets off the wire--or from the air. But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-world packet analysis and network troubleshooting. The way the pros do it.

Wireshark (derived from the Ethereal project), has become the world's most popular network sniffing application....
more

See more recommendations for this book...

40

Web Operations

Keeping the Data on Time

A web application involves many specialists, but it takes people in web ops to ensure that everything works together throughout an application's lifetime. It's the expertise you need when your start-up gets an unexpected spike in web traffic, or when a new feature causes your mature application to fail. In this collection of essays and interviews, web veterans such as Theo Schlossnagle, Baron Schwartz, and Alistair Croll offer insights into this evolving field. You'll learn stories from the trenches--from builders of some of the biggest sites on the Web--on what's necessary to help a site... more

See more recommendations for this book...

Don't have time to read the top Computer Networks books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
41
A competent system administrator knows that a Linux server is a high performance system for routing large amounts of information through a network connection. Setting up and maintaining a Linux server requires understanding not only the hardware, but the ins and outs of the Linux operating system along with its supporting cast of utilities as well as layers of applications software. There's basic documentation online but there's a lot beyond the basics you have to know, and this only comes from people with hands-on, real-world experience. This kind of "know how" is what we sought to capture... more

See more recommendations for this book...

43

Computer Networks

A Systems Approach

Computer Networks, Fourth Edition, continues to provide an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. This expanded and completely updated edition covers the why of network design, focusing not just the specifications comprising today's systems but how key technologies and protocols actually work in the real world to solve specific problems. It is the only introductory computer networking book written by authors who have had first-hand experience with many of the protocols discussed in the text, who have actually... more

See more recommendations for this book...

44
Master the technical skills and industry knowledge you need to begin an exciting career installing, configuring and troubleshooting computer networks with West/Dean/Andrews' NETWORK+ GUIDE TO NETWORKS, 8th edition. It thoroughly prepares you for success on CompTIA's Network+ N10-007 certification exam with fully mapped coverage of all objectives, including protocols, topologies, hardware, network design, security and troubleshooting. Virtualization-based projects give you experience working with a wide variety of hardware, software, operating systems and device interactions, while "On the... more

See more recommendations for this book...

45

Computer Networking First-Step

Computer Networking First Step is an accessible, easy to understand introduction to the language of the Internet. While not everyone needs to understand how to configure a router, many people are setting up Local Area Networks in their own homes, utilizing routing protocols to access the Internet, and installing Firewalls to protect their computers. These consumers of internetworking technology and aspiring network administrators need a starting point to gain a handle on the often-cryptic acronyms and terminology of the Internet. This book is the perfect companion for these non-technical... more

See more recommendations for this book...

47

Cybersecurity for Dummies

Protect your business and family against cyber attacks

Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked.

If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For...
more

See more recommendations for this book...

48
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.

Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network...
more

See more recommendations for this book...

49
Wireshark is rated #2 in the Top 100 Network Security Tools by sectools.org. Wireshark is the world's most popular network analyzer tool. This book is the ultimate resource on Wireshark which is a MUST HAVE tool used by network IT professionals to troubleshoot, secure and optimize networks. Readers learn to capture wired and wireless traffic, focus on the cause of slow web browsing, identify why applications don't run properly across the network, locate the cause of poor VoIP call quality, determine why WLANs are plagued with problems and more. The author, Laura Chappell is the founder of... more

See more recommendations for this book...

Don't have time to read the top Computer Networks books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
51
This book is a concise one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification prep. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices. The full range of certification topics is covered, including all aspects of IOS, NX-OS, and ASA software. The emphasis throughout is on solving the real-world challenges engineers face in configuring network devices, rather than on exhaustive descriptions... more

See more recommendations for this book...

52

Practical Monitoring

Do you have a nagging feeling that your monitoring could be improved, but you just aren t sure how? This is the book for you. "Monitoring Monitoring" explains what makes your monitoring less than stellar, and provides a practical approach to designing and implementing a monitoring strategy, from the application down to the hardware in the datacenter and everything in between.

In the world of technical operations, monitoring is core to everything you do. In today s changing landscape of microservices, cloud infrastructure, and more, monitoring is experiencing a new surge of growth,...
more

See more recommendations for this book...

53
An engaging introduction to vectors and matrices and the algorithms that operate on them, intended for the student who knows how to program. Mathematical concepts and computational problems are motivated by applications in computer science. The reader learns by "doing," writing programs to implement the mathematical concepts and using them to carry out tasks and explore the applications. Examples include: error-correcting codes, transformations in graphics, face detection, encryption and secret-sharing, integer factoring, removing perspective from an image, PageRank (Google's ranking... more

See more recommendations for this book...

56

REST in Practice

Hypermedia and Systems Architecture

Why don't typical enterprise projects go as smoothly as projects you develop for the Web? Does the REST architectural style really present a viable alternative for building distributed systems and enterprise-class applications?

In this insightful book, three SOA experts provide a down-to-earth explanation of REST and demonstrate how you can develop simple and elegant distributed hypermedia systems by applying the Web's guiding principles to common enterprise computing problems. You'll learn techniques for implementing specific Web technologies and patterns to solve the needs of a...
more

See more recommendations for this book...

57
“Andrew Blum plunges into the unseen but real ether of the Internet in a journey both compelling and profound….You will never open an email in quite the same way again.”
—Tom Vanderbilt, New York Times bestselling author of Traffic

In Tubes, Andrew Blum, a correspondent at Wired magazine, takes us on an engaging, utterly fascinating tour behind the scenes of our everyday lives and reveals the dark beating heart of the Internet itself. A remarkable journey through the brave new technological world we live in, Tubes is to the early...
more

See more recommendations for this book...

58

Understanding Linux Network Internals

If you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understanding Linux Network Internals is for you.

Like the popular O'Reilly book, Understanding the Linux Kernel, this book clearly explains the underlying concepts and teaches you how to follow the actual C code that implements it. Although some background in the TCP/IP protocols is helpful, you can learn a great deal from this text about the protocols themselves and their uses....
more

See more recommendations for this book...

60

CCNA Certification Aio for Dummies

A complete preparation guide for the entry-level networking CCNA certification If you're planning to advance your career by taking the all-important Cisco Certified Network Associate (CCNA), this is the study guide you need! Seven minibooks cover all the concepts and topics on which you'll be tested, covering the latest version of the exam.

Each part of the exam is covered thoroughly in its own section, so you can readily find the information you want to study. Plenty of review questions help you prepare, and the companion CD-ROM includes the highly rated Dummies Test Engine so you...
more

See more recommendations for this book...

Don't have time to read the top Computer Networks books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
62
The Art of Network ArchitectureBusiness-Driven Design The business-centered, business-driven guide to architecting and evolving networks "The Art of Network Architecture" is the first book that places business needs and capabilities at the center of the process of architecting and evolving networks. Two leading enterprise network architects help you craft solutions that are fully aligned with business strategy, smoothly accommodate change, and maximize future flexibility. Russ White and Denise Donohue guide network designers in asking and answering the crucial questions that lead to elegant,... more

See more recommendations for this book...

64
"I finally get it! I used to hear words like rootkit, buffer overflow, and idle scanning, and they just didn't make any sense. I asked other people and they didn't seem to know how these things work, or at least they couldn't explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!"
--Stephen Northcutt, CEO, SANS Institute "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for...
more

See more recommendations for this book...

65
Cyber Operations walks you through all the processes to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.

You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory, through common network services, and ending with complex web applications involving web servers and backend databases.

Key...
more

See more recommendations for this book...

66

Building Secure and Reliable Systems

Best Practices for Designing, Implementing, and Maintaining Systems

Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best practices to help your organization design scalable and reliable systems that are fundamentally secure.

Two previous O'Reilly books from Google--Site Reliability Engineering and The Site Reliability Workbook--demonstrated how and why a commitment to...
more

See more recommendations for this book...

67
A single, comprehensive resource that responds to the high demand for specialists who can provide advice to users and handle day-to-day administration, maintenance, and support of computer systems and networks Author approaches both network and system administration from the perspective of the principles that do not change on a day-to-day basis Shows how to discover customer needs and then use that information to identify, interpret, and evaluate system and network requirements New coverage includes Java services and Ipv6 less

See more recommendations for this book...

70

Getting Started with Bluetooth Low Energy

Tools and Techniques for Low-Power Networking

With Bluetooth Low Energy (BLE), smart devices are about to become even smarter. This practical guide demonstrates how this exciting wireless technology helps developers build mobile apps that share data with external hardware, and how hardware engineers can gain easy and reliable access to mobile operating systems.

This book provides a solid, high-level overview of how devices use BLE to communicate with each other. You'll learn useful low-cost tools for developing and testing BLE-enabled mobile apps and embedded firmware and get examples using various development...
more

See more recommendations for this book...

Don't have time to read the top Computer Networks books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
71
Carefully coordinated, reliable, and accurate time synchronization is vital to a wide spectrum of fields--from air and ground traffic control, to buying and selling goods and services, to TV network programming. Ill-gotten time could even lead to the unimaginable and cause DNS caches to expire, leaving the entire Internet to implode on the root servers.

Written by the original developer of the Network Time Protocol (NTP), Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition addresses the technological infrastructure...
more

See more recommendations for this book...

72

Guide to Network Defense and Countermeasures

Guide to Network Defense and Countermeasures, 2E is the second of two books that are required for Level One of the Security Certified Program (SCP). This edition has been revised with updated content and maps clearly to the exam objectives for the current Security Certified Network Professional (SCNP) exam. Although the primary emphasis is on intrusion detection, the book also covers such essential practices as developing a security policy and then implementing that policy by performing Network Address Translation, setting up packet filtering, and installing proxy servers, firewalls, and... more

See more recommendations for this book...

73
Technology impacts every aspect of life and choices are endless. As a college student, you need to know how to evaluate devices, choose apps, maintain a compelling online reputation, and lock down digital security. NEW PERSPECTIVES ON COMPUTER CONCEPTS 2018, COMPREHENSIVE goes beyond the intuitive "how-to" of apps and social media to delve into the broad concepts that are guiding current technologies such as self-driving cars, virtual reality, file sharing torrents, encrypted communications, photo forensics, and the Internet of Things. Numerous illustrations and interactive features in this... more

See more recommendations for this book...

74
GUIDE TO WIRELESS COMMUNICATIONS, 3rd Edition is designed for an entry level course in wireless data communications. The text covers the fundamentals wireless communications and provides an overview of protocols, transmission methods, and IEEE standards. GUIDE TO WIRELESS COMMUNICATIONS, 3rd Edition examines the broad range of wireless communications technologies available beginning with the basics of radio frequency and wireless data transmission and progressing to the protocols and mechanisms that every wirless network technician should understand. Key topics cover several technologies for... more

See more recommendations for this book...

75
The practice of modern medicine and biomedical research requires sophisticated information technologies with which to manage patient information, plan diagnostic procedures, interpret laboratory results, and carry out investigations. Biomedical Informatics provides both a conceptual framework and a practical inspiration for this swiftly emerging scientific discipline at the intersection of computer science, decision science, information science, cognitive science, and biomedicine. Now revised and in its third edition, this text meets the growing demand by practitioners, researchers,... more

See more recommendations for this book...

76
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same.

Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:




The underground economy for personal information: how it works, the relationships among...
more

See more recommendations for this book...

77

Networking for Dummies

The bestselling beginning networking book is now updated to cover the latest tools and trends! Fully updated and revised to include the latest trends in networking, this perennial bestseller features updated coverage of broadband technologies, storage, and backup. You'll discover the hottest topics for setting up a network at home or in the office.

Popular For Dummies author Doug Lowe knows what the networking beginner is looking for, so to that end, he offers you networking fundamentals written in his easy-to-understand style and discusses topics such as Windows 7...
more

See more recommendations for this book...

79

Computer Security Handbook

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded... more

See more recommendations for this book...

Don't have time to read the top Computer Networks books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
81
A comprehensive guide to designing and operating reliable server environments Keep your data center cool, clean, scalable, and secure Learn the five principles of effective data center design Avoid the natural and man-made hazards that can jeopardize a data center site Learn how to lay out key infrastructure objects within the data center for greatest efficiency, from buffer zones to server rows Apply proven installation methods by studying sample illustrations of both overhead and under-floor systems Extract the best practices and design strategies for both in-room and standby electrical... more

See more recommendations for this book...

82
In 1994, W. Richard Stevens and Addison-Wesley published a networking classic: TCP/IP Illustrated. The model for that book was a brilliant, unfettered approach to networking concepts that has proven itself over time to be popular with readers of beginning to intermediate networking knowledge. The Illustrated Network takes this time-honored approach and modernizes it by creating not only a much larger and more complicated network, but also by incorporating all the networking advancements that have taken place since the mid-1990s, which are many.

This book takes the popular Stevens...
more

See more recommendations for this book...

83
IDC estimates that there are more than 3 million wireless LAN administrators worldwide. CWNA is the industry standard of knowledge for wireless LAN certification and is endorsed by Cisco, Juniper, BiCSi, and others. Previous editions of this book sold more than 16,000 copies. less

See more recommendations for this book...

84

Learning Http/2

A Practical Guide for Beginners

What can your organization gain by adopting HTTP/2? How about faster, simpler, and more robust websites and applications? This practical guide demonstrates how the latest version of the Hypertext Transfer Protocol can dramatically improve website and application performance. You'll take a deep dive into HTTP/2 details, and learn how this updated protocol is changing the web landscape.

HTTP/1.1 has been the primary means of communicating data across the web for the past 20 years, but the level of interaction today has gone well beyond what people envisioned in 1997. With this book,...
more

See more recommendations for this book...

85

Active Directory for Dummies

Whether you're new to Active Directory (AD) or a savvy system administrator looking to brush up on your skills, Active Directory for Dummies, 2nd Edition will steer you in the right direction! Since its original release, Microsoft's implementation of the lightweight directory access protocol (LDAP) for the Windows Server line of networking software has become one of the most popular directory service products in the world. If you are involved with the design and support of Microsoft directory services and/or solutions, you really need this book! You'll understand the basics of AD and... more

See more recommendations for this book...

86

TCP/IP Protocol Suite

Networking technologies have become an integral part of everyday life, which has led to a dramatic increase in the number of professions where it is important to understand network technologies. TCP/IP Protocol Suite teaches students and professionals, with no prior knowledge of TCP/IP, everything they need to know about the subject. This comprehensive book uses hundreds of figures to make technical concepts easy to grasp, as well as many examples, which help tie the material to the real-world. The second edition of TCP/IP Protocol Suite has been fully updated to include all of the recent... more

See more recommendations for this book...

87
A Visual Guide to Understanding Software Defined Networks and Network Function Virtualization The simple, visual, at-a-glance guide to SDN and NFV: Core concepts, business drivers, key technologies, and more! SDN (Software Defined Networks) and NFV (Network Function Virtualization) are today's hottest areas of networking. Many executives, investors, sales professionals, and marketers need a solid working understanding of these technologies, but most books on the subject are written specifically for network engineers and other technical experts. SDN and NFV Simplified fills that... more

See more recommendations for this book...

88
Thoroughly updated to reflect the CompTIA Network+ N10-007 exam, Networking Essentials, Fifth Edition is a practical, up-to-date, and hands-on guide to the basics of networking. Written from the viewpoint of a working network administrator, it requires absolutely no experience with either network concepts or day-to-day network management.
Networking Essentials, Fifth Edition guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet and TCP/IP networks; routing protocols and router configuration; local, campus, and wide area network...
more

See more recommendations for this book...

89
Providing essential information for business managers, computer programmers, system designers, as well as home computer users, DATABASE COMMUNICATIONS AND COMPUTER NETWORKS, 8e provides a thorough introduction that includes coverage of the language of computer networks as well as the effects of data communications on business and society. Balancing technical concepts with everyday issues, it equips you with a solid understanding of the basic features, operations, and limitations of different types of computer networks. It offers full coverage of wireless technologies, industry convergence,... more

See more recommendations for this book...

90
We're all working (and playing) in a digital world. Computers, entertainment systems, satellite cable, and Internet connections--they're multiplying in virtually every household. Before you attempt to connect all the dots, check out Wiring Home Networks, the just-in-time home network how-to guide from Sunset. Step-by-step instructions help you create your own home networks for computers, video, audio, and phone systems. Need to extend DSL service to more than one computer, add cable or satellite TV access in several rooms, or increase the number of remote speakers for your CD or DVD system?... more

See more recommendations for this book...

Don't have time to read the top Computer Networks books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
92
Learn to hack!
Below are sample topics covered in the book:

- Hacking into Computers and Smartphones
- Ethical Hacking
- Scanning Your Systems
- Pinpointing Specific Vulnerabilities
- The best tools for each kind of hacking
- Cracking Encryption
- Flaws in Websites and Applications
- Attacking with Frameworks
- Penetration Testing
- Linux
- Step by Step Commands to perform
- Phishing
- Advantages and Disadvantages of WEP, WPA, WPA2, etc
- Other Wireless Hacking...
more

See more recommendations for this book...

96
CNN is reporting that a vicious new virus is wreaking havoc on the world's computer networks. Somebody's hacked one of your favorite Web sites and stolen thousands of credit card numbers. The FBI just released a new report on computer crime that's got you shaking in your boots. The experts will tell you that keeping your network safe from the cyber-wolves howling after your assets is complicated, expensive, and best left to them. But the truth is, anybody with a working knowledge of networks and computers can do just about everything necessary to defend their network against most security... more

See more recommendations for this book...

98
Network Securities Essentials: Applications and Standards introduces readers to the critical importance of internet security in our age of universal electronic connectivity. Amidst viruses, hackers, and electronic fraud, organizations and individuals are constantly at risk of having their private information compromised. This creates a heightened need to protect data and resources from disclosure, guarantee their authenticity, and safeguard systems from network-based attacks.
The Sixth Edition covers the expanding developments in the cryptography and network security...
more

See more recommendations for this book...

Don't have time to read the top Computer Networks books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.