/dev/reading
Category

Networking

38 books, 2 subcategories
Order by
View
Collection, Detection, and Analysis
by Chris Sanders and Jason Smith

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM.

Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster.

The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data.

If you've never performed NSM analysis, Applied Network Security Monitoring will give you an adequate grasp on the core concepts needed to become an effective analyst. If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job.

  • Discusses the proper methods for data collection, and teaches you how to become a skilled NSM analyst
  • Provides thorough hands-on coverage of Snort, Suricata, Bro-IDS, SiLK, and Argus
  • Loaded with practical examples containing real PCAP files you can replay, and uses Security Onion for all its lab examples
  • Companion website includes up-to-date blogs from the authors about the latest developments in NSM
A Hacker's Guide to Capture, Analysis, and Exploitation
by James Forshaw

Attacking Network Protocols is a deep dive into network protocol security from James ­Forshaw, one of the world’s leading bug ­hunters. This comprehensive guide looks at networking from an attacker’s perspective to help you discover, exploit, and ultimately ­protect vulnerabilities.

You’ll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you’ll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks.

Learn how to:

  • Capture, manipulate, and replay packets
  • Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol
  • Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service
  • Use capture and analysis tools like ­Wireshark and develop your own custom network proxies to manipulate ­network traffic

Attacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to understand and discover network vulnerabilities.

Build Virtual Network Labs Using Cisco, Juniper, and More
by Jason C. Neumann

GNS3 is open source software that emulates Cisco router and switch hardware to simulate complex networks. You can use GNS3 on any computer to experiment with various router configurations, study for that next big Cisco certification, or build the ubernetwork of your wildest dreams—all without plugging in a single physical network cable.

The Book of GNS3 will teach you how to harness the powerful GNS3 software to create your own virtual networks with Cisco and Juniper devices. Hands-on tutorials throughout show you how to:

  • Configure Cisco IOS and ASA devices in GNS3
  • Add Juniper routers to your projects with VirtualBox and QEMU
  • Connect GNS3’s hub, switch, and cloud devices to physical hardware
  • Integrate Cisco IOU virtual machines for advanced switching features
  • Simulate a Cisco access server to practice managing devices
  • Build bigger labs by distributing project resources across multiple computers

Why set up all of that expensive physical hardware before you know whether it will all work together? Learn how to build virtual networks with The Book of GNS3, and stop reconfiguring your lab every time you want to test something new.

Building a Mail Server with Courier and Cyrus
by Peer Heinlein and Peer Hartleben

IMAP (the Internet Message Access Protocol) allows clients to access their email on a remote server, whether from the office, a remote location, or a cell phone or other device. IMAP is powerful and flexible, but it's also complicated to set up; it's more difficult to implement than POP3 and more error-prone for both client and server.

The Book of IMAP offers a detailed introduction to IMAP and POP3, the two protocols that govern all modern mail servers and clients. You'll learn how the protocols work as well as how to install, configure, and maintain the two most popular open source mail systems, Courier and Cyrus.

Authors Peer Heinlein and Peer Hartleben have set up hundreds of mail servers and offer practical hints about troubleshooting errors, migration, filesystem tuning, cluster setups, and password security that will help you extricate yourself from all sorts of tricky situations. You'll also learn how to:

  • Create and use shared folders, virtual domains, and user quotas
  • Authenticate user data with PAM, MySQL, PostgreSQL, and LDAP
  • Handle heavy traffic with load balancers and proxies
  • Use built-in tools for server analysis, maintenance, and repairs
  • Implement complementary webmail clients like Squirrelmail and Horde/IMP
  • Set up and use the Sieve email filter

Thoroughly commented references to the POP and IMAP protocols round out the book, making The Book of IMAP an essential resource for even the most experienced system administrators.

A No-Nonsense Guide to the OpenBSD Firewall
by Peter N. M. Hansteen

OpenBSD’s stateful packet filter, PF, is the heart of the OpenBSD firewall. With more and more services placing high demands on bandwidth and an increasingly hostile Internet environment, no sysadmin can afford to be without PF expertise.

The third edition of The Book of PF covers the most up-to-date developments in PF, including new content on IPv6, dual stack configurations, the “queues and priorities” traffic-shaping system, NAT and redirection, wireless networking, spam fighting, failover provisioning, logging, and more.

You’ll also learn how to:

  • Create rule sets for all kinds of network traffic, whether crossing a simple LAN, hiding behind NAT, traversing DMZs, or spanning bridges or wider networks
  • Set up wireless networks with access points, and lock them down using authpf and special access restrictions
  • Maximize flexibility and service availability via CARP, relayd, and redirection
  • Build adaptive firewalls to proactively defend against attackers and spammers
  • Harness OpenBSD’s latest traffic-shaping system to keep your network responsive, and convert your existing ALTQ configurations to the new system
  • Stay in control of your traffic with monitoring and visualization tools (including NetFlow)

The Book of PF is the essential guide to building a secure network with PF. With a little effort and this book, you’ll be well prepared to unlock PF’s full potential.

"This book left me totally impressed at the breadth of capabilities offered by PF...I can recommend it to anyone with an interest (professional or otherwise) in network management." —Computing Reviews

by Wendell Odom

Cisco Press has the only study guides approved by Cisco for the new CCNA certification. The new edition of the best-selling two-book value-priced CCNA 200-301 Official Cert Guide Library includes updated content, new online practice exercises, more than 600 practice exam questions, and more than 2 hours of video training—PLUS the CCNA Network Simulator Lite Editions with 34 free Network Simulator labs.

CCNA 200-301 Official Cert Guide Library is a comprehensive review and practice package for the latest CCNA exam and is the only self-study resource approved by Cisco. The two books contained in this package, CCNA 200-301 Official Cert Guide, Volume 1 and CCNA 200-301 Official Cert Guide, Volume 2, present complete reviews and a more challenging and realistic preparation experience. The books have been fully updated to refresh the content for the latest CCNA exam topics and to enhance certain key topics that are critical for exam success.

Best-selling author Wendell Odom shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

  • A test-preparation routine proven to help you pass the exams
  • Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section
  • Chapter-ending Key Topic tables, which help you drill on key concepts you must know thoroughly
  • The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports
DCCOR 350-601
by Somit Maloo, Iskren Nikolov and Firas Ahmed

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCNP and CCIE Data Center Core DCCOR 350-601 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CCNP and CCIE Data Center Core DCCOR 350-601 Official Cert Guide, Second Edition helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Data center networking experts Somit Maloo, Iskren Nikolov, and Firas Ahmed share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

  • A test-preparation routine proven to help you pass the exam
  • Do I Know This Already? quizzes, which let you decide how much time you need to spend on each section
  • Exam Topic lists that make referencing easy
  • Chapter-ending exercises, which help you drill on key concepts you must know thoroughly
  • The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports
  • A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
  • Study plan suggestions and templates to help you organize and optimize your study time
ENCOR 350-401
by Brad Edgeworth, Ramiro Garza Rios, David Hucaby and Jason Gooley

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCNP and CCIE ENCOR 350-401 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide, Second Edition helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Expert authors Brad Edgeworth, Ramiro Garza Rios, Jason Gooley, and Dave Hucaby share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

  • A test-preparation routine proven to help you pass the exam
  • Do I Know This Already? quizzes, which let you decide how much time you need to spend on each section
  • Exam Topic lists that make referencing easy
  • Chapter-ending exercises, which help you drill on key concepts you must know thoroughly
  • The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports
  • More than 90 minutes of video mentoring from the author
  • A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
  • Study plan suggestions and templates to help you organize and optimize your study time
SCOR 350-701
by Omar Santos

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCNP and CCIE Security Core SCOR 350-701 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide, Second Edition helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Expert author Omar Santos shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

  • A test-preparation routine proven to help you pass the exam
  • Do I Know This Already? quizzes, which let you decide how much time you need to spend on each section
  • Exam Topic lists that make referencing easy
  • Chapter-ending exercises, which help you drill on key concepts you must know thoroughly
  • The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports
  • A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
  • Study plan suggestions and templates to help you organize and optimize your study time
ENARSI 300-410
by Brad Edgeworth and Raymond Lacoste

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the 300-410 ENARSI exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success. Expert authors Raymond Lacoste and Brad Edgeworth share preparation hints and test-taking tips, helping you identify areas of weakness, and improve both your conceptual knowledge and hands-on skills.

This complete study package includes:

  • A test-preparation routine proven to help you pass the exam
  • Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section
  • Exam Topic lists that make referencing easy
  • Chapter-ending exercises, which help you drill on key concepts you must know thoroughly
  • The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports
  • More than 70 minutes of video mentoring from the author
  • A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
  • Study plan suggestions and templates to help you organize and optimize your study time
CCDE 400-007
by Zig Zsiga

Marwan Alshawi's best-selling Cisco Press book, the CCDE Study Guide, served as the inspiration and content basis for this new Official Cert Guide which covers the latest CCDE exam blueprint.

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

Cisco Certified Design Expert (CCDE 400-007) Official Cert Guide presents you with an organized test preparation routine using proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.

  • Master Cisco CCDE 400-007 exam topics
  • Assess your knowledge with chapter-opening quizzes
  • Review key concepts with exam preparation tasks
  • Practice with realistic exam questions in the practice test software

Cisco Certified Design Expert (CCDE 400-007) Official Cert Guide from Cisco Press helps you prepare to succeed on the exam and is the only self-study resource approved by Cisco. CCDE expert Zig Zsiga shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

  • A test-preparation routine proven to help you pass the exams
  • Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section
  • Chapter-ending Key Topic tables, which help you drill on key concepts you must know thoroughly
  • The powerful Pearson Test Prep Practice Test software, with two full exams comprised of well-reviewed, exam-realistic questions, customization options, and detailed performance reports
  • An online interactive Flash Cards application to help you drill on Key Terms by chapter
  • A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
  • Study plan suggestions and templates to help you organize and optimize your study time

Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, this official study guide helps you understand the concepts and apply the techniques you need to ensure your exam success.

DEVASC 200-901
by Chris Jackson, Adrian Iliesiu, Ashutosh Malegaonkar and Jason Gooley

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

Cisco Certified DevNet Associate DEVASC 200-901 Official Cert Guide presents you with an organized test preparation routine using proven series elements and techniques. Do I Know This Already? quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.

  • Master Cisco Certified DevNet Associate DEVASC 200-901 exam topics
  • Assess your knowledge with chapter-opening quizzes
  • Review key concepts with exam preparation tasks
  • Practice with realistic exam questions in the practice test software

Cisco Certified DevNet Associate DEVASC 200-901 Official Cert Guide enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Four leading Cisco technology experts share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

  • A test-preparation routine proven to help you pass the exams
  • Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section
  • The powerful Pearson Test Prep Practice Test software, with two full exams comprised of well-reviewed, exam-realistic questions, customization options, and detailed performance reports
  • More than two hours of video training from the author
  • A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
  • Study plan suggestions and template to help you organize and optimize your study time

Well regarded for its level of detail, study plans, assessment features, , and video instruction, this official study guide helps you master the concepts and techniques that ensure your exam success.

Router and Switch Management, the Easy Way
by Michael W. Lucas

Cisco routers and switches are the cornerstones of many networks. But when things break, repairs can intimidate even the most competent administrator. Luckily, just knowing the "in case of emergency" basics will take you far.

Just like the original, this second edition of the highly acclaimed Cisco Routers for the Desperate is written for the administrator in crisis mode. Updated to cover switches and the latest Cisco terminology, with a tighter focus on the needs of the small network administrator, this second edition gives you what you need to know to provide reliable network services and fix problems fast. You'll find coverage of:

  • Installation—how to get your router and network connections up and running right the first time
  • Troubleshooting routers and switches, so that you can determine whether your hardware or the Internet is broken
  • Security concerns, like how to keep your network equipment safe from hackers and install a private network between two offices
  • How to implement basic network redundancy to reduce the risk of network downtime

Cisco Routers for the Desperate, 2nd Edition is designed to be read once and left alone until something breaks. When it does, you'll have everything you need to know in one easy-to-follow guidebook.

Exam N10-008
by Mike Meyers and Scott Jernigan

This up-to-date Mike Meyers exam guide delivers complete coverage of every topic on the N10-008 version of the CompTIA Network+ Certification exam

Get complete coverage of all the CompTIA Network+ exam objectives inside this comprehensive resource. Created and edited by Mike Meyers, the leading expert on CompTIA certification and training, CompTIA Network+ Certification All-in-One Exam Guide, Eighth Edition covers exam N10-008 in full detail. You’ll find learning objectives at the beginning of each chapter, exam tips, scenarios, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this authoritative guide also serves as an essential on-the-job reference.

Covers all exam topics, including:

  • Network architectures
  • Cabling and topology
  • Ethernet basics
  • Network installation
  • TCP/IP applications and network protocols
  • Routing
  • Network naming
  • Advanced networking devices
  • IPv6
  • Remote connectivity
  • Wireless networking
  • Virtualization and cloud computing
  • Mobile networking
  • Network operations
  • Managing risk
  • Network security
  • Network monitoring and troubleshooting
Exam N10-008
by Mike Meyers and Scott Jernigan

This fully updated four-color textbook is designed for classroom use and covers every topic on the latest version of the challenging CompTIA Network+ exam.

Written by Mike Meyers, the leading CompTIA certification and training expert, this full-color resource prepares students for the CompTIA Network+ exam and puts you on the path to becoming an expert networking professional. Thoroughly revised for the current version of the CompTIA Network+ exam, the book contains helpful on-the-job advice, hands-on examples, chapter summaries, key terms quizzes, review questions, lab projects, and hundreds of photographs and illustrations.

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Sixth Edition (Exam N10-008) covers the latest concepts and technologies, including basic datacenter, cloud, and virtual networking concepts. Students will learn networking fundamentals and best practices, and networking fundamentals while following the path to becoming an effective networking professional. Special design elements throughout reinforce salient points while preparing you for exam day.

  • Contains 100% coverage of every objective for CompTIA Network+ exam N10-008
  • Online content includes 100 accurate practice questions, a self-assessment practice exam engine, videos and lab simulations from Mike Meyers, and on-the-job tools and utilities
  • Written by CompTIA certification and training guru Mike Meyers
  • Instructor materials and answer keys are available to adopting instructors through your McGraw Hill sales representative (answers are not printed in the book)
Exam N10-008
by Anthony J. Sequeira

Trust the best selling Cert Guide series from Pearson IT Certification to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

CompTIA Network+ N10-008 Cert Guide presents you with an organized test preparation routine using proven series elements and techniques. Key Topics call out critical concepts. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks and Review Questions help you drill on key concepts you must know thoroughly.

  • Master CompTIA Network+ N10-008 exam topics
  • Assess your knowledge with chapter-ending quizzes
  • Review key concepts with exam preparation tasks
  • Practice with realistic exam questions in the practice test software

CompTIA Network+ N10-008 Cert Guide contains proven study features that allow you to succeed on the exam the first time. Expert instructor Anthony Sequeira shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills, essential for successful completion of the performance-based testing items on the exam.

Exam N10-008
by Todd Lammle

Prepare for the Network+ certification and a new career in network installation and administration.

In the newly revised Fifth Edition of CompTIA Network+ Study Guide Exam N10-008, bestselling author and network expert Todd Lammle delivers thorough coverage of how to install, configure, and troubleshoot today’s basic networking hardware peripherals and protocols.

This book will prepare you to succeed on the sought-after CompTIA Network+ certification exam, impress interviewers in the network industry, and excel in your first role as a junior network administrator, support technician, or related position.

The accomplished author draws on his 30 years of networking experience to walk you through the ins and outs of the five functional domains covered by the Network+ Exam N10-008: Networking fundamentals, implementations, operations, security, and troubleshooting. You’ll also get:

  • Complete, domain-specific coverage of the updated Network+ Exam N10-008
  • Preparation to obtain a leading network certification enjoyed by over 350,000 networking professionals
  • Access to a superior set of online study tools, including practice exams, flashcards, and glossary of key terms.

Perfect for anyone preparing for the latest version of the CompTIA Network+ Exam N10-008, the Fifth Edition of CompTIA Network+ Study Guide Exam N10-008 is a must-have resource for network administrators seeking to enhance their skillset with foundational skills endorsed by industry and thought leaders from around the world.

by David J. Wetherall and Andrew S. Tanenbaum

Computer Networks, 5th edition is appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments.

Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum's in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach: Tanenbaum presents key principles, then illustrates them utilizing real-world example networks that run through the entire book—the Internet, and wireless networks, including Wireless LANs, broadband wireless and Bluetooth. The Fifth Edition includes a chapter devoted exclusively to network security. The textbook is supplemented by a Solutions Manual, as well as a Website containing PowerPoint slides, art in various forms, and other tools for instruction, including a protocol simulator whereby students can develop and test their own network protocols.

A No-Nonsense Guide for the Reasonably Paranoid
by Seth Enoka

Cybersecurity for Small Networks is a straightforward guide to improving network security whether you’re running Linux, Windows, or macOS.

As you work through the book’s projects, you’ll learn core hardening techniques like how to map a network, track the status of devices, and recognize unusual activity that might signal an attack. You’ll explore ways to eliminate vulnerabilities and prevent unwanted access to mobile, desktop, or even IoT endpoints. You’ll also learn how to implement custom back-up strategies and how to detect, prevent, and mitigate malware or ransomware attacks.

On the still more technical side, you will:

  • Use and configure firewalls like pfSense and iptables to filter network traffic
  • Create a network segmentation plan to separate devices by risk, manage user access, and configure wireless authentication
  • Deploy OpenVPN or Wireguard network-wide to encrypt and protect network communication
  • Use a Squid proxy to obfuscate personal or business data and control web traffic
  • Implement a traffic access point (TAP) to capture and analyze network traffic, and build a Security Onion monitoring appliance to alert you to suspicious activity
  • No matter your level of experience, Cybersecurity for Small Networks will arm you with the tools and knowledge you need to lock down your network, and defend and recover from attacks.
Learn socket programming in C and write secure and optimized network code
by Lewis Van Winkle

Network programming enables processes to communicate with each other over a computer network, but it is a complex task that requires programming with multiple libraries and protocols. With its support for third-party libraries and structured documentation, C is an ideal language to write network programs.

Complete with step-by-step explanations of essential concepts and practical examples, this C network programming book begins with the fundamentals of Internet Protocol, TCP, and UDP. You’ll explore client-server and peer-to-peer models for information sharing and connectivity with remote computers. The book will also cover HTTP and HTTPS for communicating between your browser and website, and delve into hostname resolution with DNS, which is crucial to the functioning of the modern web. As you advance, you’ll gain insights into asynchronous socket programming and streams, and explore debugging and error handling. Finally, you’ll study network monitoring and implement security best practices.

By the end of this book, you’ll have experience of working with client-server applications and be able to implement new network programs in C.

The code in this book is compatible with the older C99 version as well as the latest C18 and C++17 standards. You’ll work with robust, reliable, and secure code that is portable across operating systems, including Winsock sockets for Windows and POSIX sockets for Linux and macOS.

What you will learn

  • Uncover cross-platform socket programming APIs
  • Implement techniques for supporting IPv4 and IPv6
  • Understand how TCP and UDP connections work over IP
  • Discover how hostname resolution and DNS work
  • Interface with web APIs using HTTP and HTTPS
  • Explore Simple Mail Transfer Protocol (SMTP) for electronic mail transmission
  • Apply network programming to the Internet of Things (IoT)

Who this book is for

If you're a developer or a system administrator who wants to get started with network programming, this book is for you. Basic knowledge of C programming is assumed.

An Illustrated Guide to Protocols, Privacy, Censorship, and Governance
by ARTICLE 19

The internet has profoundly changed interpersonal communication, but most of us don’t really understand how it works. What enables information to travel across the internet? Can we really be anonymous and private online? Who controls the internet, and why is that important? And… what’s with all the cats?

How the Internet Really Works answers these questions and more. Using clear language and whimsical illustrations, the authors translate highly technical topics into accessible, engaging prose that demystifies the world’s most intricately linked computer network. Alongside a feline guide named Catnip, you’ll learn about:

  • The “How-What-Why” of nodes, packets, and internet protocols
  • Cryptographic techniques to ensure the secrecy and integrity of your data
  • Censorship, ways to monitor it, and means for circumventing it
  • Cybernetics, algorithms, and how computers make decisions
  • Centralization of internet power, its impact on democracy, and how it hurts human rights
  • Internet governance, and ways to get involved

This book is also a call to action, laying out a roadmap for using your newfound knowledge to influence the evolution of digitally inclusive, rights-respecting internet laws and policies.

Whether you’re a citizen concerned about staying safe online, a civil servant seeking to address censorship, an advocate addressing worldwide freedom of expression issues, or simply someone with a cat-like curiosity about network infrastructure, you will be delighted — and enlightened — by Catnip’s felicitously fun guide to understanding how the internet really works!

by Barry Pollard

HTTP/2 in Action is a complete guide to HTTP/2, one of the core protocols of the web. Because HTTP/2 has been designed to be easy to transition to, including keeping it backwards compatible, adoption is rapid and expected to increase over the next few years. Concentrating on practical matters, this interesting book presents key HTTP/2 concepts such as frames, streams, and multiplexing and explores how they affect the performance and behavior of your websites.

A Practical Guide to Adopting Zero Trust Architectures
by Avinash Naduvath

Before an enterprise answers How can we achieve a Zero Trust architecture? they should be asking Why are we looking at Zero Trust as an access model? Does it align with our vision? In an innovative format, Cisco security architecture expert Avinash Naduvath guides you through the philosophical questions and practical answers for an enterprise looking to start the Zero Trust journey.

A conversational model will take you from the initial stages of identifying goals and pitching solutions, through practical tasks that highlight tangible outcomesincluding common primary use casesin order to bring focus to the correct implementation and maintenance of a Zero Trust architecture.

For a future where success is measured as much by the security of a system as by the functionality, In Zero Trust We Trust is designed to help everyone at every stage and level of leadership understand not only the conceptual underpinnings, but the real-world context of when, how, and why to deploy Zero Trust security controls. This book provides the starting point for helping you change the mindset of others, and getting them to understand why Zero Trust isnt simply a conversation to be had, but a movement to embrace.

  • Origins of the Zero Trust philosophy in security architecture explained, and why it took so long to catch on
  • Detailed examination of how to ask the right questions so as to implement the right security answers for clients
  • Understanding the metrics by which to measure Zero Trust success, and what maintaining that success looks like
  • Identifying the stakeholders and empowering a Zero Trust team within an enterprise
  • Examples of how to catalyze opinion and tailor tactics to motivate investment in secure Zero Trust architecture
  • Implement, monitor, feedback, repeat: Presenting and building a roadmap for a sustainable security architecture
  • Looking ahead to a Zero Trust Lifecycle Framework and a blueprint for the future
by Ben Piper

Learn Cisco Network Administration in a Month of Lunches is a tutorial designed for beginners who want to learn how to administer Cisco switches and routers. Just set aside one hour a day (lunchtime would be perfect) for a month, and you'll start learning practical Cisco Network administration skills faster than you ever thought possible.

Attack Detection and Response with iptables, psad, and fwsnort
by Michael Rash

System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.

Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics:

  • Passive network authentication and OS fingerprinting
  • iptables log analysis and policies
  • Application layer attack detection with the iptables string match extension
  • Building an iptables ruleset that emulates a Snort ruleset
  • Port knocking vs. Single Packet Authorization (SPA)
  • Tools for visualizing iptables logs

Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables—along with psad and fwsnort—to detect and even prevent compromises.

System and Network Monitoring
by Wolfgang Barth

Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It's robust but also complex, and Nagios: System and Network Monitoring, 2nd Edition, updated to address Nagios 3.0, will help you take full advantage of this program.

Nagios, which runs on Linux and most *nix variants, can be configured to continuously monitor network services such as SMTP, POP3, HTTP, NNTP, SSH, and FTP. It can also supervise host resources (processor load, disk and memory usage, running processes, log files, and so on) and environmental factors, such as temperature and humidity. This book is your guide to getting the most out of this versatile and powerful monitoring tool.

Inside Nagios, you’ll learn how to:

  • Install and configure the Nagios core, all standard plugins, and selected third-party plugins
  • Configure the notification system to alert you of ongoing problems—and to alarm others in case of a serious crisis
  • Program event handlers to take automatic action when trouble occurs
  • Write Perl plugins to customize Nagios for your unique needs
  • Quickly understand your Nagios data using graphing and visualization tools
  • Monitor Windows servers, SAP systems, and Oracle databases

The book also includes a chapter that highlights the differences between Nagios versions 2 and 3 and gives practical migration and compatibility tips. Nagios: System and Network Monitoring, 2nd Edition is a great starting point for configuring and using Nagios in your own environment.

An expert-led journey to building a successful career as a network architect
by Alim H. Ali

Becoming a network architect is challenging—it demands hands-on engineering skills, encompassing hardware installation, configuration, and fabric layout design. Equally crucial, it involves collaboration with internal teams and C-Suite stakeholders, and adeptly managing external entities like vendors and service providers. The Network Architect's Handbook comprehensively covers these vital aspects, guiding you to evolve into an effective network architect within an organization, fostering seamless communication with leadership teams and other stakeholders.

Starting with a clear definition of a network architect’s role, this book lays out a roadmap and delves into the attributes and mindset for success. You’ll then explore network architect design, physical infrastructure routing and switching, and network services such as DNS, MLAG, and service insertion. As you progress, you’ll gain insights into the necessary skills and typical daily challenges faced by network architects. And to thoroughly prepare you to advance in your career, this handbook covers certifications and associated training for maintaining relevance in an organization, along with common interview questions for a network architect's position.

Armed with essential concepts, techniques, and your newfound skills, you’ll be well-prepared to pursue a career as a network architect.

What you will learn

  • Examine the role of a network architect
  • Understand the key design makers in an organization
  • Choose the best strategies to meet stakeholder needs
  • Be well-versed with networking concepts
  • Prepare for a network architect position interview
  • Distinguish the different IT architects in an organization
  • Identify relevant certification for network architects
  • Understand the various de facto network/fabric architect models used today

Who this book is for

This book is for network engineers and technicians aspiring to transition into the role of a network architect. Whether you are at the beginning of your journey or seeking guidance along the path, this book will support you with its deep coverage of key aspects such as design concepts, architectural requirements, relevant experience, certifications, and advanced education with a special emphasis on cloud best practices. A practical understanding of IT networking is necessary to get the most out of this book.

by Michael W. Lucas

You know that servers have log files and performance measuring tools and that traditional network devices have LEDs that blink when a port does something. You may have tools that tell you how busy an interface is, but mostly a network device is a black box. Network Flow Analysis opens that black box, demonstrating how to use industry-standard software and your existing hardware to assess, analyze, and debug your network.

Unlike packet sniffers that require you to reproduce network problems in order to analyze them, flow analysis lets you turn back time as you analyze your network. You'll learn how to use open source software to build a flow-based network awareness system and how to use network analysis and auditing to address problems and improve network reliability. You'll also learn how to use a flow analysis system; collect flow records; view, filter, and report flows; present flow records graphically; and use flow records to proactively improve your network. Network Flow Analysis will show you how to:

  • Identify network, server, router, and firewall problems before they become critical
  • Find defective and misconfigured software
  • Quickly find virus-spewing machines, even if they’re on a different continent
  • Determine whether your problem stems from the network or a server
  • Automatically graph the most useful data

And much more. Stop asking your users to reproduce problems. Network Flow Analysis gives you the tools and real-world examples you need to effectively analyze your network flow data. Now you can determine what the network problem is long before your customers report it, and you can make that silly phone stop ringing.

Tracking Hackers through Cyberspace
by Sherri Davidoff and Jonathan Ham

On the Internet, every action leaves a mark–in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind.

Learn to recognize hackers’ tracks and uncover network-based evidence in **Network Forensics: Tracking Hackers through Cyberspace.**Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire.

Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence.

Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensics and find out.

An Essential Guide for the Accidental Admin
by John Ross
  • Download Chapter 5: "Designing Your Network" Are the machines in your office living isolated lives? Do you have a few computers at home that you want to connect to each other and the Internet? The best way to share files on a group of computers is to create a network. But how do you do that?

Network Know-How is your guide to connecting your machines, filled with practical advice that will show you how to get things done. You'll learn the nitty-gritty of network setup, design, and maintenance, from running cables and placing wireless access points to configuring file sharing and printing. This practical and comprehensive guide will teach you how to implement security, create intranets, and more. You'll learn how to:

  • Connect Windows, Macintosh, and Linux computers
  • Implement network addressing
  • Configure your network adapters, hubs, switches, and router
  • Share music, photos, and documents
  • Automate household appliances and stream digital audio and video to your home entertainment center
  • Troubleshoot network slowdowns and failures

No matter which operating system you use, and even if you’ve never installed or run a network before, you’ll get what you need to know in Network Know-How.

Skills for the Next-Generation Network Engineer
by Matt Oswalt, Christian Adell, Scott S. Lowe and Jason Edelman

Network engineers are finding it harder than ever to rely solely on manual processes to get their jobs done. New protocols, technologies, delivery models, and the need for businesses to become more agile and flexible have made network automation essential. The updated second edition of this practical guide shows network engineers how to use a range of technologies and tools, including Linux, Python, APIs, and Git, to automate systems through code. This edition also includes brand new topics such as network development environments, cloud, programming with Go, and a reference network automation architecture.

Network Programmability and Automation will help you automate tasks involved in configuring, managing, and operating network equipment, topologies, services, and connectivity. Through the course of the book, you'll learn the basic skills and tools you need to make this critical transition.

You'll learn:

  • Programming skills with Python and Go: data types, conditionals, loops, functions, and more
  • New Linux-based networking technologies and cloud native environments, and how to use them to bootstrap development environments for your network projects
  • Data formats and models: JSON, XML, YAML, Protobuf, and YANG
  • Jinja templating for creating network device configurations
  • A holistic approach to architecting network automation services
  • The role of application programming interfaces (APIs) in network automation
  • Source control with Git to manage code changes during the automation process
  • Cloud-native technologies like Docker and Kubernetes
  • How to automate network devices and services using Ansible, Nornir, and Terraform
  • Tools and technologies for developing and continuously integrating network automation
Code Secure and Reliable Network Services from Scratch
by Adam Woodbeck

Combining the best parts of many other programming languages, Go is fast, scalable, and designed for high-performance networking and multiprocessing. In other words, it’s perfect for network programming.

Network Programming with Go will help you leverage Go to write secure, readable, production-ready network code. In the early chapters, you’ll learn the basics of networking and traffic routing. Then you’ll put that knowledge to use as the book guides you through writing programs that communicate using TCP, UDP, and Unix sockets to ensure reliable data transmission.

As you progress, you’ll explore higher-level network protocols like HTTP and HTTP/2 and build applications that securely interact with servers, clients, and APIs over a network using TLS.

You'll also learn:

  • Internet Protocol basics, such as the structure of IPv4 and IPv6, multicasting, DNS, and network address translation
  • Methods of ensuring reliability in socket-level communications
  • Ways to use handlers, middleware, and multiplexers to build capable HTTP applications with minimal code
  • Tools for incorporating authentication and encryption into your applications using TLS
  • Methods to serialize data for storage or transmission in Go-friendly formats like JSON, Gob, XML, and protocol buffers
  • Ways of instrumenting your code to provide metrics about requests, errors, and more
  • Approaches for setting up your application to run in the cloud (and reasons why you might want to)

Network Programming with Go is all you’ll need to take advantage of Go’s built-in concurrency, rapid compiling, and rich standard library.

Covers Go 1.15 (Backward compatible with Go 1.12 and higher)

by Gordon Davies

A network is a collection of computers, servers, mobile devices, or other computing devices connected for sharing data. This book will help you become well versed in basic networking concepts and prepare to pass Microsoft's MTA Networking Fundamentals Exam 98-366.

Following Microsoft's official syllabus, the book starts by covering network infrastructures to help you differentiate intranets, internets, and extranets, and learn about network topologies. You'll then get up to date with common network hardware devices such as routers and switches and the media types used to connect them together. As you advance, the book will take you through different protocols and services and the requirements to follow a standardized approach to networking. You'll get to grips with the OSI and TCP/IP models as well as IPv4 and IPv6. The book also shows you how to recall IP addresses through name resolution. Finally, you'll be able to practice everything you've learned and take the exam confidently with the help of mock tests.

By the end of this networking book, you'll have developed a strong foundation in the essential networking concepts needed to pass Exam 98-366.

What you will learn

  • Become well versed in networking topologies and concepts
  • Understand network infrastructures such as intranets, extranets, and more
  • Explore network switches, routers, and other network hardware devices
  • Get to grips with different network protocols and models such as OSI and TCP/IP
  • Work with a variety of network services such as DHCP, NAT, firewalls, and remote access
  • Apply networking concepts in different real-world scenarios

Who this book is for

If you're new to the IT industry or simply want to gain a thorough understanding of networking, this book is for you. A basic understanding of the Windows operating system and your network environment will be helpful.

Using Wireshark to Solve Real-World Network Problems
by Chris Sanders

It’s easy to capture packets with Wireshark, the world’s most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what’s happening on your network?

Updated to cover Wireshark 2.x, the third edition of Practical Packet Analysis will teach you to make sense of your packet captures so that you can better troubleshoot network problems. You’ll find added coverage of IPv6 and SMTP, a new chapter on the powerful command line packet analyzers tcpdump and TShark, and an appendix on how to read and reference packet values using a packet map.

Practical Packet Analysis will show you how to:

  • Monitor your network in real time and tap live network communications
  • Build customized capture and display filters
  • Use packet analysis to troubleshoot and resolve common network problems, like loss of connectivity, DNS issues, and slow speeds
  • Explore modern exploits and malware at the packet level
  • Extract files sent across a network from packet captures
  • Graph traffic patterns to visualize the data flowing across your network
  • Use advanced Wireshark features to understand confusing captures
  • Build statistics and reports to help you better explain technical network information to non-techies

No matter what your level of experience is, Practical Packet Analysis will show you how to use Wireshark to make sense of any network and get things done.

A Comprehensive, Illustrated Internet Protocols Reference
by Charles M. Kozierok

From Charles M. Kozierok, the creator of the highly regarded www.pcguide.com, comes The TCP/IP Guide. This completely up-to-date, encyclopedic reference on the TCP/IP protocol suite will appeal to newcomers and the seasoned professional alike. Kozierok details the core protocols that make TCP/IP internetworks function and the most important classic TCP/IP applications, integrating IPv6 coverage throughout. Over 350 illustrations and hundreds of tables help to explain the finer points of this complex topic. The book’s personal, user-friendly writing style lets readers of all levels understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet, and much more.

The TCP/IP Guide is a must-have addition to the libraries of internetworking students, educators, networking professionals, and those working toward certification.

The Protocols
by Kevin R. Fall and W. Richard Stevens

TCP/IP Illustrated, Volume 1, Second Edition, is a detailed and visual guide to today’s TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There’s no better way to discover why TCP/IP works as it does, how it reacts to common conditions, and how to apply it in your own applications and networks.

Building on the late W. Richard Stevens’ classic first edition, author Kevin R. Fall adds his cutting-edge experience as a leader in TCP/IP protocol research, updating the book to fully reflect the latest protocols and best practices. He first introduces TCP/IP’s core goals and architectural concepts, showing how they can robustly connect diverse networks and support multiple services running concurrently. Next, he carefully explains Internet addressing in both IPv4 and IPv6 networks. Then, he walks through TCP/IP’s structure and function from the bottom up: from link layer protocols–such as Ethernet and Wi-Fi–through network, transport, and application layers.

Fall thoroughly introduces ARP, DHCP, NAT, firewalls, ICMPv4/ICMPv6, broadcasting, multicasting, UDP, DNS, and much more. He offers extensive coverage of reliable transport and TCP, including connection management, timeout, retransmission, interactive data flow, and congestion control. Finally, he introduces the basics of security and cryptography, and illuminates the crucial modern protocols for protecting security and privacy, including EAP, IPsec, TLS, DNSSEC, and DKIM. Whatever your TCP/IP experience, this book will help you gain a deeper, more intuitive understanding of the entire protocol suite so you can build better applications and run more reliable, efficient networks.

Understanding Incident Detection and Response
by Richard Bejtlich

Network security is not simply about building impenetrable walls — determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.

You'll learn how to:

  • Determine where to deploy NSM platforms, and size them for the monitored networks
  • Deploy stand-alone or distributed NSM installations
  • Use command line and graphical packet analysis tools, and NSM consoles
  • Interpret network evidence from server-side and client-side intrusions
  • Integrate threat intelligence into NSM software to identify sophisticated adversaries

There’s no foolproof way to keep attackers out of your network. But when they get in, you’ll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

Building Secure Systems in Untrusted Networks
by Razi Rais, Christina Morillo, Evan Gilman and Doug Barth

This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth explanations of key concepts to help you fully comprehend the zero trust security architecture.

  • Examine fundamental concepts of zero trust security model, including trust engine, policy engine, and context aware agents
  • Understand how this model embeds security within the system's operation, with guided scenarios at the end of each chapter
  • Migrate from a perimeter-based network to a zero trust network in production
  • Explore case studies that provide insights into organizations' zero trust journeys
  • Learn about the various zero trust architectures, standards, and frameworks developed by NIST, CISA, DoD, and others