100 Best Network Security Books of All Time

We've researched and ranked the best network security books in the world, based on recommendations from world experts, sales data, and millions of reader ratings. Learn more

Featuring recommendations from Elon Musk, Eric Weinstein, Ryan Holiday, and 17 other experts.
1
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logistical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.

Throughout the text are clear...
more
Recommended by Stephen Kinsella, and 1 others.

Stephen Kinsella@gavreilly @SLSingh Love that book (Source)

See more recommendations for this book...

2

The Cuckoo's Egg

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error...
more
Recommended by Rick Klau, James Stanley, and 2 others.

Rick Klau@AtulAcharya @stevesi Same. Read it in college, realized I was more excited about the tech than what I was studying -- and Cliff did such a great job helping you understand what was going on. Such a great book. (Source)

James Stanley"The Cuckoo's Egg" by Clifford Stoll is another great book. I believe it's the first documented account of a computer being misused by a remote attacker. It talks about how Clifford attached physical teleprinters to the incoming phone lines so that he could see what the attacker was actually doing on the computer, and how he traced the attacker across several countries. (Source)

See more recommendations for this book...

3

Daemon (Daemon, #1)

A high-tech thriller for the wireless age that explores the unthinkable consequences of a computer program running without human control—a daemon—designed to dismantle society and bring about a new world order

Technology controls almost everything in our modern-day world, from remote entry on our cars to access to our homes, from the flight controls of our airplanes to the movements of the entire world economy. Thousands of autonomous computer programs, or daemons, make our networked world possible, running constantly in the background of our lives, trafficking e-mail,...
more
Recommended by Elon Musk, Eric Weinstein, and 2 others.

Elon MuskA great read. (Source)

Eric Weinstein[Eric Weinstein recommended this book on Twitter.] (Source)

See more recommendations for this book...

4
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us the ingenious ways we manipulate language and invent new means of communicating with each other. And through CODE, we see how this ingenuity and our very human compulsion to communicate have driven the technological innovations of the past two centuries.

Using everyday objects and familiar language systems such as Braille and Morse code, author Charles Petzold weaves an illuminating narrative for anyone who’s ever wondered about the secret inner life of...
more
Recommended by Ana Bell, and 1 others.

Ana BellIt gets you to use your imagination to virtually build a computer. It’s easy to read, you can lie down on the couch and enjoy it—it’s not so much of a textbook. It demystifies the magic of a computer and what it is. (Source)

See more recommendations for this book...

5
Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual... more

See more recommendations for this book...

6

Hacking

The Art of Exploitation

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C...
more

See more recommendations for this book...

7
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack... more

See more recommendations for this book...

8

The Nicomachean Ethics

‘One swallow does not make a summer; neither does one day. Similarly neither can one day, or a brief space of time, make a man blessed and happy’

In the Nicomachean Ethics, Aristotle sets out to examine the nature of happiness. He argues that happiness consists in ‘activity of the soul in accordance with virtue’, for example with moral virtues, such as courage, generosity and justice, and intellectual virtues, such as knowledge, wisdom and insight. The Ethics also discusses the nature of practical reasoning, the value and the objects of pleasure, the different...
more

Ryan HolidayAristotle’s Nicomachean Ethics was something I reread and cannot recommend highly enough. (Source)

A C GraylingHe said the great question is how we should live well, so that we live a good life, and he came up with a very positive response – what distinguishes us from the rest of the world is our possession of reason (Source)

Christian B MillerAccording to Aristotle, it is hard to become virtuous, and hard to become vicious too. The character of most people is somewhere in the middle. (Source)

See more recommendations for this book...

9
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.

For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.

You'll learn how to:


Set up a safe virtual environment to analyze...
more

See more recommendations for this book...

10
CompTIA Security+ Get Certified Get Ahead: SY0-401 Study Guide is an update to the top-selling SY0-301 guide, which helped thousands of readers pass the exam the first time they took it. The SY0-301 version covers every aspect of the SY0-301 exam, and includes the same elements readers raved about in the previous version.

Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. The author uses many of the same analogies and explanations he’s honed in the classroom that have helped hundreds of...
more

See more recommendations for this book...

Don't have time to read the top Network Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
11
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.

Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network...
more

See more recommendations for this book...

12
The weird fiction short stories of H.P. Lovecraft from 1917-1935. Excludes collaborations.

The eBook’s table of contents is listed below. It includes the year each story was written.

The Tomb (1917)
Dagon (1917)
Polaris (1918)
Beyond the Wall of Sleep (1919)
Memory (1919)
Old Bugs (1919)
The Transition of Juan Romero (1919)
The White Ship (1919)
The Doom That Came to Sarnath (1919)
The Statement of Randolph Carter (1919)
The Terrible Old Man (1920)
The Tree (1920)
The Cats of Ulthar (1920)
The Temple...
more

See more recommendations for this book...

14
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.

Authors Evan Gilman and Doug Barth show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing...
more

See more recommendations for this book...

15
In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important skills that any aspiring pentester needs. This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device... more

Alex Caceres/hacker Frmrly Known As Dotslashpunk@gvgm3 @SecurityTube For networks i'd have to say hands down the OSCP is likely one of the best you're going to find. Fuck the cert, take the course, get down and dirty in the labs and break everything. I hear @georgiaweidman's book is good (Pen testing with Metasploit) but have not read it myself (Source)

See more recommendations for this book...

16
Network security is not simply about building impenetrable walls — determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to...
more

See more recommendations for this book...

17
CompTIA Security+ SY0-501 Exam Cram , Fifth Edition, is the perfect study guide to help you pass CompTIA's newly updated version of the Security+ exam. It provides coverage and practice questions for every exam topic. The book contains a set of 150 questions. The powerful Pearson Test Prep practice test software provides real-time practice and feedback with all the questions so you can simulate the exam.
Covers the critical information you need to know to score higher on your Security+ exam! - Analyze indicators of compromise and determine types of attacks, threats, and...
more

See more recommendations for this book...

18
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more. less
Recommended by Ben Goldacre, and 1 others.

Ben Goldacre@szbalint it's such a great book, i've always said @rossjanderson should release it in chunks as pop science books. the massive textbook shape doesn't do its accessibility, readability and content justice! (Source)

See more recommendations for this book...

19
The TCP/IP Guide is both an encyclopedic and comprehensible guide to the TCP/IP protocol suite that will appeal to newcomers and the seasoned professional. It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet and much more. The author offers not only a... more

See more recommendations for this book...

20
Overcome Your Fastest-Growing Security Problem: Internal, Client-Based Attacks

Today's most devastating security attacks are launched from within the company, by intruders who have compromised your users' Web browsers, e-mail and chat clients, and other Internet-connected software. Hardening your network perimeter won't solve this problem. You must systematically protect client software and monitor the traffic it generates.

Extrusion Detection is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out....
more

See more recommendations for this book...

Don't have time to read the top Network Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
21
This Password book is designed to keep all your important website addresses, usernames, and passwords in one secure and convenient place.
The Pages are arranged in alphabetical order, so you can easily and quickly find what you are looking!!

Features:



plenty of space: 105 pages
Alphabetized pages
Premium matte cover design
Perfectly Sized at 6" x 9"
Flexible Paperback
Printed on high quality
less

See more recommendations for this book...

22
If you've ever spent hours renaming files or updating hundreds of spreadsheet cells, you know how tedious tasks like these can be. But what if you could have your computer do them for you?

In "Automate the Boring Stuff with Python," you'll learn how to use Python to write programs that do in minutes what would take you hours to do by hand no prior programming experience required. Once you've mastered the basics of programming, you'll create Python programs that effortlessly perform useful and impressive feats of automation to: Search for text in a file or across multiple...
more

See more recommendations for this book...

23
Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 6e, helps you prepare for professional certification -- and career success. The text fully maps to the new CompTIA Security+ SY0-501 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the fundamental essentials of network and computer security, the sixth edition includes expanded coverage of embedded device security, attacks and defenses, and new software tools to assess security. Practical,... more

See more recommendations for this book...

25
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.




Thoroughly revised for the new CompTIA Network+ exam, the Seventh Edition of this bestselling All-in-One Exam Guide delivers 100% coverage of the exam objectives and serves as a valuable on-the-job reference

Take the latest version of the CompTIA Network+ exam with complete confidence using the fully updated information contained in...
more

See more recommendations for this book...

26
This value-packed packed set for the serious CISSP certification candidate combines the bestselling (ISC) CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition with an all new collection of Practice Exams to give you the best preparation ever for the high-stakes CISSP Exam.

(ISC) CISSP Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster...
more

See more recommendations for this book...

27

Network Security Assessment

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack.

Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in...
more

See more recommendations for this book...

28
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM.

Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident...
more

See more recommendations for this book...

29

Ghost in the Wires

My Adventures as the World's Most Wanted Hacker

If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia, Motorola, Pacific Bell, and other mammoth enterprises. His Ghost in the Wires memoir paints an action portrait of a plucky loner motivated by a passion for trickery, not material game. (P.S. Mitnick's capers have already been the subject of two books and a movie. This first-person account is...

more

Richard BejtlichIn 2002 I reviewed Kevin Mitnick's first book, The Art of Deception. In 2005 I reviewed his second book, The Art of Intrusion. I gave both books four stars. Mitnick's newest book, however, with long-time co-author Bill Simon, is a cut above their previous collaborations and earns five stars. As far as I can tell (and I am no Mitnick expert, despite reading almost all previous texts mentioning... (Source)

Antonio EramThis book was recommended by Antonio when asked for titles he would recommend to young people interested in his career path. (Source)

Nick JanetakisI'm going to start reading Ghost in the Wires by Kevin Mitnick this week. I used to go to 2600 meetings back when he was arrested for wire fraud and other hacking related shenanigans in the mid 1990s. I'm fascinated by things like social engineering and language in general. In the end, I just want to be entertained by his stories. For someone who is into computer programming, a book like this... (Source)

See more recommendations for this book...

30
Wireshark is the world's most popular network analyzer tool with over 1 million downloads per month. As the Founder of Wireshark University, Laura Chappell is undoubtedly one of the best Wireshark instructors around.

In this updated book, Laura offers step-by-step instructions on the key functions and features of Wireshark, including:


Filter on addresses, protocols, fields or traffic characteristics Create custom columns for more efficient analysis Find the source of delays with filters and coloring rules Perform unattended captures with auto-stop conditions Filter...
more

See more recommendations for this book...

Don't have time to read the top Network Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
31

Hacking Exposed 7

Network Security Secrets and Solutions

A fully updated edition of the world's bestselling computer security book "Hacking Exposed 7: Network Security Secrets and Solutions" is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more The 7th Edition also features a new "5 Deployments" approach for the first time that provides five key actions... more

See more recommendations for this book...

33

Metasploit

The Penetration Tester's Guide

"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit ProjectThe Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.

Once you've built your foundation for penetration testing, you'll learn the...
more

See more recommendations for this book...

34
In the eighth action-packed thriller in the New York Times bestselling Pike Logan series, ISIS, the most maniacal terrorist organization the modern world has ever seen, is poised to make their most audacious strike yet.
The United States has anticipated and averted countless attacks from terrorist groups—thanks in large part to the extralegal counterterrorist unit known as the Taskforce. But in The Insider Threat, a much more insidious evil is about to shatter the false sense of safety surrounding civilized nations. While world powers combat...
more

See more recommendations for this book...

36
SSL/TLS is the cornerstone of security on the Internet, but understanding it and using it are not simple tasks. Quite the contrary; mistakes are easy to make and can often fully compromise security. Bulletproof SSL and TLS is the first SSL book written with users in mind. It is the book you will want to read if you need to assess risks related to website encryption, manage keys and certificates, configure secure servers, and deploy secure web applications. Bulletproof SSL and TLS is based on several years of work researching SSL and how SSL is used in real life, implementing and supporting a... more

See more recommendations for this book...

37
Wireshark is rated #2 in the Top 100 Network Security Tools by sectools.org. Wireshark is the world's most popular network analyzer tool. This book is the ultimate resource on Wireshark which is a MUST HAVE tool used by network IT professionals to troubleshoot, secure and optimize networks. Readers learn to capture wired and wireless traffic, focus on the cause of slow web browsing, identify why applications don't run properly across the network, locate the cause of poor VoIP call quality, determine why WLANs are plagued with problems and more. The author, Laura Chappell is the founder of... more

See more recommendations for this book...

38

The Art of Memory Forensics

Detecting Malware and Threats in Windows, Linux, and Mac Memory

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields.

Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows,...
more

See more recommendations for this book...

39
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
This bestselling on-the-job reference and test preparation guide has been fully revised for the new 2019 CompTIA Core 1 and Core 2 CompTIA A+ exam objectives
This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1001 & 220-1002. You'll find learning objectives at the beginning of each chapter, exam...
more

See more recommendations for this book...

40
Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job and improves security.

This book saves you from sifting a decade of obsolete online tutorials and quickly gets you running:SSH with the OpenSSH server and the PuTTY and OpenSSH clients. You will:

Eliminate passwords.
Manage access to your SSH server by users, groups, addresses, and more
Securely move files around your network
Forward graphic displays from one host to another
Forward...
more

See more recommendations for this book...

Don't have time to read the top Network Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
41
For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop Novena and his mentorship of various hardware startups and developers. In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective.

Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips,...
more

See more recommendations for this book...

42
Prepare for the future of cloud infrastructure: Distributed Services Platforms

By moving service modules closer to applications, Distributed Services (DS) Platforms will future-proof cloud architectures-improving performance, responsiveness, observability, and troubleshooting. Network pioneer Silvano Gai demonstrates DS Platforms' remarkable capabilities and guides you through implementing them in diverse hardware.

Focusing on business benefits throughout, Gai shows how to provide essential shared services such as segment routing, NAT, firewall,...
more

See more recommendations for this book...

43

Secure System Design and Trustable Computing

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions and networking services. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of and trust in, modern society s microelectronic-supported... more

See more recommendations for this book...

44
This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to... more

See more recommendations for this book...

45
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems--energy production, water, gas, and other vital systems--becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems.

The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough...
more

See more recommendations for this book...

46

Blue Team Field Manual (BTFM)

Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident. less

See more recommendations for this book...

47
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through... more

See more recommendations for this book...

48
Founder and former president of Blackwater, the private contractor that provided security in Iraq and Afghanistan defends himself from the many accusations that his organization was trigger-happy and bilked the American taxpayer. less

See more recommendations for this book...

50

Network Warrior

Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout.
more

See more recommendations for this book...

Don't have time to read the top Network Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
51
The groundbreaking bestselling expose of the shadowy mercenary army that perpetrated horrific war crimes in America's name. On September 16, 2007, machine gun fire erupted in Baghdad's Nisour Square, leaving seventeen Iraqi civilians dead, among them women and children. The shooting spree, labeled "Baghdad's Bloody Sunday," was neither the work of Iraqi insurgents nor U.S. soldiers. The shooters were private forces, subcontractors working for the secretive mercenary company, Blackwater Worldwide, led by Erik Prince

Award-winning journalist Jeremy Scahill takes us from the...
more
Recommended by Stephen Armstrong, and 1 others.

Stephen ArmstrongWell this is the exact opposite of The Circuit, in that it is much more academic. I think they are both incredibly important books. Blackwater is written by a US journalist called Jeremy Scahill. The book shows the beauty of American print journalism. It is so well researched and thoroughly documented that it moves beyond a research book and into an impassioned, well written, freely flowing... (Source)

See more recommendations for this book...

52

BGP Design and Implementation

Learn practical guidelines for designing and deploying a scalable BGP routing architecture

Up-to-date coverage of BGP features like performance tuning, multiprotocol BGP, MPLS VPN, and multicast BGP In-depth coverage of advanced BGP topics to help design a complex BGP routing architecture Practical design tips that have been proven in the field Extensive configuration examples and case studies

"BGP Design and Implementation" focuses on real-world problems and provides not only design solutions, but also the background on why they are appropriate and a practical overview...
more

See more recommendations for this book...

54
NATIONAL BESTSELLER A Pulitzer Prize Finalist and the definitive history of DARPA, the Defense Advanced Research Project Agency, from the author of the New York Times bestseller Area 51

No one has ever written the history of the Defense Department's most secret, most powerful, and most controversial military science R&D agency. In the first-ever history about the organization, New York Times bestselling author Annie Jacobsen draws on inside sources, exclusive interviews, private...
more

See more recommendations for this book...

55
Prepare for CompTIA Network+ N10-007 exam success with this CompTIA approved Exam Cram from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner.

CompTIA(R) Network+ N10- 007 Exam Cram, Sixth Edition is the perfect study guide to help you pass CompTIA's Network+ N10-007 exam. It provides coverage and practice questions for every exam topic, including substantial new coverage of security, cloud networking, IPv6, and wireless technologies. The book presents you with an organized...
more

See more recommendations for this book...

56
In an age of massive global surveillance, when last year's most advanced cyberwarfare weapons quickly migrate into every hacker's toolkit, you can no longer afford to rely on outdated security methods. If you care about privacy and security today, you need to step up your game -- especially if you're a sysadmin responsible for Internet-facing services. That means you need to master and use advanced security technologies like the TLS communications security protocol, PGP encryption, and the Tor anonymity network. Tools like these have often been viewed as too complex or mysterious for... more

See more recommendations for this book...

57
For one-semester undergraduate/graduate level courses and for self-study. William Stallings offers a practical survey of both the principles and practice of cryptography and network security, reflecting the latest developments in the field. less

See more recommendations for this book...

58

CISSP All-in-One Exam Guide

A new edition of Shon Harris' bestselling exam prep guide--fully updated for the new CISSP 2018 Common Body of Knowledge
This effective self-study guide fully prepares you for the challenging CISSP exam and offers 100% coverage of all exam domains. This edition has been thoroughly revised to cover the new CISSP 2018 Common Body of Knowledge, hot spot and drag and drop question formats, and more.
CISSP All-in-One Exam Guide, Eighth Edition features hands-on exercises as well as "Notes," "Tips," and "Cautions" that provide real-world insight and call out potentially...
more

See more recommendations for this book...

59
The Blue Team Handbook is a "zero fluff" reference guide for cyber security incident responders, security engineers, and InfoSec pros alike. The BTHb includes essential information in a condensed handbook format. Main topics include the incident response process, how attackers work, common tools for incident response, a methodology for network analysis, common indicators of compromise, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, packet headers, and numerous other quick reference topics. The book is designed specifically to share "real life experience," so it... more

See more recommendations for this book...

60
CompTIA A+ 220-901 and 220-902 exams retired in 2019. Search the store to find CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) books, eBooks, and video courses.
CompTIA A+ 220-901 and 220-902 Practice Questions Exam Cram
CompTIA A+ 220-901 and 220-902 Practice Questions Exam Cram complements any A+ study plan with 640 practice test questions in the book and on the companion site-all supported by complete explanations of every answer. This package's highly realistic questions cover every area of knowledge for both new A+ exams: 220-901 and 220-902.
Covers...
more

See more recommendations for this book...

Don't have time to read the top Network Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
61

Operation Hail Storm (Hail, #1)

Marshall Hail was a husband, a father, a Physics Nobel prize winner and industrial billionaire. But when Hail's family was killed in a terrorist attack, he became a predator and redirected his vast industrial assets toward one goal, removing every person on the FBI's Top 10 Terrorist list. With the help of his MIT colleagues, Hail designed and built a devastating arsenal of attack drones of all shapes and sizes that are flown by the nation's best young gamers. The world will come to realize that Marshall Hail possesses the capability of getting to anyone, anywhere, at any time, unleashing an... more

See more recommendations for this book...

63

Computer Networking

A Top-Down Approach

Building on the successful top-down approach of previous editions, the Fourth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts. With this edition, Kurose and Ross bring the issues of network security to the forefront, along with integration of the most current and relevant networking technologies.

Computer Networks and the Internet; Application Layer; Transport Layer; The Network Layer; The Link Layer...
more

See more recommendations for this book...

64
If My People guides believers on a 40-day prayer journey in the spirit of 2 Chronicles 7:14.


"If My people who are called by My name will humble themselves, and pray and seek My face, and turn from their wicked ways, then I will hear from heaven, and will forgive their sin and heal their land."


In the days prior to the election, this prayer booklet guides believers through 40 days of prayer, plus providing seven prayers from past presidents, inspired during some of our country's darkest days.
less

See more recommendations for this book...

65
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.

If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the...
more

See more recommendations for this book...

66
This is Cisco's official, comprehensive self-study resource for Cisco's SVPN 300-730 exam (Implementing Secure Solutions with Virtual Private Networks), one of the most popular concentration exams required for the Cisco Certified Network Professional (CCNP) Security certification. It will thoroughly prepare network professionals to deliver secure solutions based on Cisco VPN technologies.
Designed for all CCNP Security candidates, CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide covers every SVPN #300-730 objective concisely and logically, with...
more

See more recommendations for this book...

67
The official study guide for the AWS certification specialty exam

The AWS Certified Advanced Networking Official Study Guide - Specialty Exam helps to ensure your preparation for the AWS Certified Advanced Networking - Specialty Exam. Expert review of AWS fundamentals align with the exam objectives, and detailed explanations of key exam topics merge with real-world scenarios to help you build the robust knowledge base you need to succeed on the exam--and in the field as an AWS Certified Networking specialist. Coverage includes the design, implementation, and...
more

See more recommendations for this book...

68
Revised and updated to address current issues and technology, System Forensics, Investigation, and Response, Third Edition provides a solid, broad grounding in digital forensics. The text begins by examining the fundamentals of system forensics: what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. Part II addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, Part III explores... more

See more recommendations for this book...

69

Linux Phrasebook

Linux Phrasebook "is sure to become the pocket guide that you keep within reach at all times.Thisconcise, handy reference can be used "in the street," just like a languagephrasebook.Skipping the usual tutorial on Linux, the "Linux Phrasebook" goes straight to practical Linux uses, providing immediate applicable solutions for day-to-day tasks. Itincludes code phrases that allow Linux users to employ the command line to complete onerous and repetitive tasks, as well as flexible code and commands can be customized to meet the needs of any Linux user. The concise information combined with random... more

See more recommendations for this book...

70
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you'll learn the fundamentals of intelligence analysis, as well as the best ways to incorporate these techniques into your incident response process.

Each method reinforces the other: threat intelligence supports and augments incident response, while...
more

See more recommendations for this book...

Don't have time to read the top Network Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
71
This book is a concise one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification prep. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices. The full range of certification topics is covered, including all aspects of IOS, NX-OS, and ASA software. The emphasis throughout is on solving the real-world challenges engineers face in configuring network devices, rather than on exhaustive descriptions... more

See more recommendations for this book...

72
Exploring the Magic of Wireless Communication

There are countless ways for radio signals to travel from transmitter to receiver, and understanding how radio waves interact with their environment is an important factor in successful radio communications. While amateurs can maximize station performance and reliability with the right equipment, knowledge and skill, we cannot control propagation. Through scientific exploration and experimentation, we can improve our understanding of propagation and how it affects radio signals.

Propagation and Radio Science presents a...
more

See more recommendations for this book...

73
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted.

The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more...
more

See more recommendations for this book...

75
Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style "plays," this straightforward guide gets to the root of many of the roadblocks people may face while penetration...
more

See more recommendations for this book...

76

Gray Hat Hacking

The Ethical Hacker's Handbook

Up-to-date strategies for thwarting the latest, most insidious network attacks

This fully updated, industry-standard security resource shows how to fortify computer networks by learning and effectively applying ethical hacking techniques. Based on critical topics that the authors teach at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks.

Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition,...
more

See more recommendations for this book...

78
It's easy enough to install Wireshark and begin capturing packets off the wire--or from the air. But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-world packet analysis and network troubleshooting. The way the pros do it.

Wireshark (derived from the Ethereal project), has become the world's most popular network sniffing application....
more

See more recommendations for this book...

79
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of... more

See more recommendations for this book...

Don't have time to read the top Network Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
81
Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics, such as binary instrumentation, dynamic taint analysis, and symbolic execution, in an accessible way.

As malware increasingly obfuscates itself and applies anti-analysis techniques to thwart our analysis, we need more sophisticated methods that allow us to raise that dark curtain designed to keep us out--binary analysis can help. The goal of all binary analysis is to determine (and possibly modify) the true properties of binary programs...
more

See more recommendations for this book...

83
One of the world’s leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you—and how this makes everyone more vulnerable than ever imagined. 


Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home...
more

See more recommendations for this book...

85
CERM16 - The Reference Manual Every PE Civil Examinee Needs!

Michael R. Lindeburg, PE’s PE Civil Reference Manual, 16th Edition (Also known as CERM16) is the only reference you need to prepare for the Breadth portion of the PE Civil exam. This comprehensive manual follows NCEES PE Civil exam specifications and addresses complex topics by parsing them into condensed, understandable, readable sections. Offering a complete review of all exam topics, this reference manual is up-to-date to the current exam specifications and design standards, and employs instructional design to...
more

See more recommendations for this book...

86
"The book you are about to read will arm you with the knowledge you need to defend your network from attackers--both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you."

--Ron Gula, founder and CTO, Tenable Network Security, from the Foreword

"Richard Bejtlich has a good...
more

See more recommendations for this book...

87
Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You'll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone.

Written by members of Cisco's Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec...
more

See more recommendations for this book...

88
Becoming a master of networking has never been easier

Whether you're in charge of a small network or a large network, Networking All-in-One is full of the information you'll need to set up a network and keep it functioning. Fully updated to capture the latest Windows 10 releases through Spring 2018, this is the comprehensive guide to setting up, managing, and securing a successful network.

Inside, nine minibooks cover essential, up-to-date information for networking in systems such as Windows 10 and Linux, as well as best practices for security, mobile and...
more

See more recommendations for this book...

89

The Shellcoder's Handbook

Discovering and Exploiting Security Holes

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable... more

See more recommendations for this book...

90
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:


Create a trojan command-and-control using GitHub
Detect sandboxing and automate common malware tasks,...
more

See more recommendations for this book...

Don't have time to read the top Network Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
91
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Up-to-date, focused coverage of every topic on the CompTIA Network+ exam N10-007
Get on the fast track to becoming CompTIA Network+ certified with this affordable, portable study tool. Inside, certification training experts guide you through the official N10-007 exam objectives in the order that CompTIA presents them, providing a concise review...
more

See more recommendations for this book...

92

Elementary Information Security

Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

An ideal text for introductory information security courses, the second edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cybersecurity and technology. Thoroughly updated with an increased emphasis on mobile devices and technologies, this essential text enables students to gain...
more

See more recommendations for this book...

96
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.




This hands-on, project-based approach to the fundamentals of network security concepts and skills helps students understand security best practices, laws, and standards that will enable them to build a complete security program.This book introduces a strong foundation that includes security policy, planning, and development of good processes. A step-by-step design teaches...
more

See more recommendations for this book...

97
Some have claimed that War is too important to be left to the generals, but P. W. Singer asks What about the business executives? Breaking out of the guns-for-hire mold of traditional mercenaries, corporations now sell skills and services that until recently only state militaries possessed. Their products range from trained commando teams to strategic advice from generals. This new Privatized Military Industry encompasses hundreds of companies, thousands of employees, and billions of dollars in revenue. Whether as proxies or suppliers, such firms have participated in wars in Africa, Asia, the... more

See more recommendations for this book...

98
The Nmap 6 Cookbook provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results. Topics covered include: * Installation on Windows, Mac OS X, and Unix/Linux platforms * Basic and advanced scanning techniques * Network inventory and auditing * Firewall evasion techniques * Zenmap - A graphical front-end for Nmap * NSE - The Nmap Scripting Engine * Ndiff - The Nmap scan comparison utility * Ncat - A flexible networking utility... more

See more recommendations for this book...

99
Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it.

In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios...
more

See more recommendations for this book...

Don't have time to read the top Network Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.