// Comparison
The Practice of Network Security Monitoring vs Zero Trust Networks: Which Should You Read?
Two cybersecurity books on Defensive, compared honestly: who each is for, what each does best, and which to read first.
Understanding Incident Detection and Response
Richard Bejtlich
Richard Bejtlich's NSM playbook: how to deploy collection sensors, validate that you actually see what you think you see, and build detection workflows around open-source tools.
Building Secure Systems in Untrusted Networks
Evan Gilman, Doug Barth
Evan Gilman and Doug Barth's pre-marketing-bubble treatment of zero-trust architecture — what it is when you actually implement it (trust evaluation, device identity, dynamic policy) versus what the vendor pitch turned it into.
Read this if
Skip this if
Key takeaways
- Detection without prevention is a strategic choice, not a fallback; Bejtlich was years ahead in arguing the case and the book remains the clearest argument.
- The four data types (full content, session, transactional, statistical) are still the right framework for thinking about detection coverage.
- Most SOC failures are organizational and procedural, not tooling; the book's chapters on workflows, runbooks, and analyst growth are still the best in print.
- Zero trust is a property of the architecture, not a product; the book makes this case convincingly enough that it should be the first read for anyone leading a ZT initiative.
- Device and workload identity are the load-bearing layer most ZT deployments under-invest in.
- Migration is the project — most organizations cannot adopt zero trust without a multi-year incremental plan, and the book's chapters on incremental rollout are the most useful in practice.
How they compare
We rate The Practice of Network Security Monitoring higher (5/5 against 4/5 for Zero Trust Networks). For most readers, that means The Practice of Network Security Monitoring is the primary pick and Zero Trust Networks is a useful follow-up.
Both books target intermediate-level readers, so the choice is about topic, not difficulty.
The Practice of Network Security Monitoring and Zero Trust Networks both cover Defensive, Networking, so reading them in sequence reinforces the same material from different angles.
Keep reading
The Practice of Network Security Monitoring
→ Alternatives to The Practice of Network Security Monitoring→ What to read after The Practice of Network Security Monitoring