//Topic
Best Networking books
10 books in our catalog cover Networking, ranked by rating. Each entry is an opinionated review with who the book is for and who should skip it.
01 · 2017
Attacking Network Protocols
A Hacker's Guide to Capture, Analysis, and Exploitation
James Forshaw, Project Zero veteran, on how to capture, parse, and break protocols from the wire up to the application layer, with a strong focus on building reusable analysis tooling.
Advanced5/5James Forshaw02 · 2013
The Practice of Network Security Monitoring
Understanding Incident Detection and Response
Richard Bejtlich's NSM playbook: how to deploy collection sensors, validate that you actually see what you think you see, and build detection workflows around open-source tools.
Intermediate5/5Richard Bejtlich03 · 2008
Hacking: The Art of Exploitation
A from-first-principles tour of low-level exploitation that still teaches the mindset two decades later.
Intermediate5/5Jon Erickson04 · 2005
Silence on the Wire
A Field Guide to Passive Reconnaissance and Indirect Attacks
Michal Zalewski's classic on the indirect attack surface: timing channels, protocol-stack fingerprinting, and the often-overlooked side data leaked by every layer of a stack.
Advanced5/5Michal Zalewski05 · 2021
Black Hat Python
Python Programming for Hackers and Pentesters
Justin Seitz and Tim Arnold's hands-on tour of writing offensive tooling in Python: network sniffers, web scrapers, GitHub-based command-and-control, screen capture, keylogging, and Volatility extensions.
Intermediate4/5Justin Seitz, Tim Arnold06 · 2020
Black Hat Go
Go Programming For Hackers and Pentesters
Tom Steele, Chris Patten, and Dan Kottmann show how to use Go's networking primitives, concurrency model, and cross-compilation to write offensive tooling that runs almost anywhere.
Intermediate4/5Tom Steele, Chris Patten, Dan Kottmann07 · 2017
Network Security Through Data Analysis
From Data to Action
Michael Collins on building situational awareness from network telemetry: collection architecture, statistical baseline-setting, and the analytic patterns that turn raw flows into detection.
Intermediate4/5Michael Collins08 · 2017
Practical Packet Analysis
Using Wireshark to Solve Real-World Network Problems
Chris Sanders' working manual for Wireshark, geared at troubleshooting and incident response rather than abstract protocol theory. Updated for Wireshark 2.x.
Beginner4/5Chris Sanders09 · 2017
Zero Trust Networks
Building Secure Systems in Untrusted Networks
Evan Gilman and Doug Barth's pre-marketing-bubble treatment of zero-trust architecture — what it is when you actually implement it (trust evaluation, device identity, dynamic policy) versus what the vendor pitch turned it into.
Intermediate4/5Evan Gilman, Doug Barth10 · 2007
Linux Firewalls
Attack Detection and Response with iptables, psad, and fwsnort
Michael Rash, author of psad and fwsnort, on building and operating Linux-native packet filtering and intrusion-response tooling. Pre-nftables in detail but conceptually durable.
Intermediate4/5Michael Rash