//Topic

Best Networking books

10 books in our catalog cover Networking, ranked by rating. Each entry is an opinionated review with who the book is for and who should skip it.

  1. 01 · 2017

    Attacking Network Protocols

    A Hacker's Guide to Capture, Analysis, and Exploitation

    James Forshaw, Project Zero veteran, on how to capture, parse, and break protocols from the wire up to the application layer, with a strong focus on building reusable analysis tooling.

    Advanced5/5James Forshaw
  2. 02 · 2013

    The Practice of Network Security Monitoring

    Understanding Incident Detection and Response

    Richard Bejtlich's NSM playbook: how to deploy collection sensors, validate that you actually see what you think you see, and build detection workflows around open-source tools.

    Intermediate5/5Richard Bejtlich
  3. 03 · 2008

    Hacking: The Art of Exploitation

    A from-first-principles tour of low-level exploitation that still teaches the mindset two decades later.

    Intermediate5/5Jon Erickson
  4. 04 · 2005

    Silence on the Wire

    A Field Guide to Passive Reconnaissance and Indirect Attacks

    Michal Zalewski's classic on the indirect attack surface: timing channels, protocol-stack fingerprinting, and the often-overlooked side data leaked by every layer of a stack.

    Advanced5/5Michal Zalewski
  5. 05 · 2021

    Black Hat Python

    Python Programming for Hackers and Pentesters

    Justin Seitz and Tim Arnold's hands-on tour of writing offensive tooling in Python: network sniffers, web scrapers, GitHub-based command-and-control, screen capture, keylogging, and Volatility extensions.

    Intermediate4/5Justin Seitz, Tim Arnold
  6. 06 · 2020

    Black Hat Go

    Go Programming For Hackers and Pentesters

    Tom Steele, Chris Patten, and Dan Kottmann show how to use Go's networking primitives, concurrency model, and cross-compilation to write offensive tooling that runs almost anywhere.

    Intermediate4/5Tom Steele, Chris Patten, Dan Kottmann
  7. 07 · 2017

    Network Security Through Data Analysis

    From Data to Action

    Michael Collins on building situational awareness from network telemetry: collection architecture, statistical baseline-setting, and the analytic patterns that turn raw flows into detection.

    Intermediate4/5Michael Collins
  8. 08 · 2017

    Practical Packet Analysis

    Using Wireshark to Solve Real-World Network Problems

    Chris Sanders' working manual for Wireshark, geared at troubleshooting and incident response rather than abstract protocol theory. Updated for Wireshark 2.x.

    Beginner4/5Chris Sanders
  9. 09 · 2017

    Zero Trust Networks

    Building Secure Systems in Untrusted Networks

    Evan Gilman and Doug Barth's pre-marketing-bubble treatment of zero-trust architecture — what it is when you actually implement it (trust evaluation, device identity, dynamic policy) versus what the vendor pitch turned it into.

    Intermediate4/5Evan Gilman, Doug Barth
  10. 10 · 2007

    Linux Firewalls

    Attack Detection and Response with iptables, psad, and fwsnort

    Michael Rash, author of psad and fwsnort, on building and operating Linux-native packet filtering and intrusion-response tooling. Pre-nftables in detail but conceptually durable.

    Intermediate4/5Michael Rash

Related topics