Network Security Books

Showing 1-50 of 248
Hacking Exposed: Network Security Secrets & Solutions Hacking Exposed: Network Security Secrets & Solutions (Paperback)
by (shelved 7 times as network-security)
avg rating 3.80 — 1,165 ratings — published 2000
Rate this book
Clear rating
Network Security Assessment: Know Your Network Network Security Assessment: Know Your Network (Paperback)
by (shelved 4 times as network-security)
avg rating 4.01 — 91 ratings — published 2004
Rate this book
Clear rating
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (Paperback)
by (shelved 4 times as network-security)
avg rating 4.23 — 1,226 ratings — published 2007
Rate this book
Clear rating
Hacking: The Art of Exploitation w/CD Hacking: The Art of Exploitation w/CD (Paperback)
by (shelved 3 times as network-security)
avg rating 4.17 — 2,501 ratings — published 2003
Rate this book
Clear rating
Metasploit: The Penetration Tester's Guide Metasploit: The Penetration Tester's Guide (Paperback)
by (shelved 3 times as network-security)
avg rating 4.07 — 867 ratings — published 2011
Rate this book
Clear rating
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (Paperback)
by (shelved 3 times as network-security)
avg rating 4.36 — 425 ratings — published 2009
Rate this book
Clear rating
Hacking Linux Exposed: Linux Security Secrets & Solutions Hacking Linux Exposed: Linux Security Secrets & Solutions (Paperback)
by (shelved 3 times as network-security)
avg rating 3.83 — 149 ratings — published 2001
Rate this book
Clear rating
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems (Paperback)
by (shelved 3 times as network-security)
avg rating 4.10 — 430 ratings — published 2007
Rate this book
Clear rating
Hacking Exposed Windows: Windows Security Secrets & Solutions Hacking Exposed Windows: Windows Security Secrets & Solutions (Paperback)
by (shelved 2 times as network-security)
avg rating 3.61 — 36 ratings — published 2007
Rate this book
Clear rating
Computer Networking: A Top-Down Approach Computer Networking: A Top-Down Approach (Hardcover)
by (shelved 2 times as network-security)
avg rating 4.08 — 2,230 ratings — published 2000
Rate this book
Clear rating
Network Warrior: Everything you need to know that wasn't on the CCNA exam Network Warrior: Everything you need to know that wasn't on the CCNA exam (Paperback)
by (shelved 2 times as network-security)
avg rating 4.19 — 431 ratings — published 2007
Rate this book
Clear rating
The Practice of Network Security Monitoring: Understanding Incident Detection and Response The Practice of Network Security Monitoring: Understanding Incident Detection and Response (Paperback)
by (shelved 2 times as network-security)
avg rating 4.06 — 266 ratings — published 2013
Rate this book
Clear rating
Sams Teach Yourself TCP/IP in 24 Hours Sams Teach Yourself TCP/IP in 24 Hours (Paperback)
by (shelved 2 times as network-security)
avg rating 3.47 — 96 ratings — published
Rate this book
Clear rating
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference (Hardcover)
by (shelved 2 times as network-security)
avg rating 4.49 — 208 ratings — published 2005
Rate this book
Clear rating
Wireshark 101: Essential Skills for Network Analysis Wireshark 101: Essential Skills for Network Analysis (Paperback)
by (shelved 2 times as network-security)
avg rating 4.23 — 122 ratings — published 2013
Rate this book
Clear rating
Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide (Paperback)
by (shelved 2 times as network-security)
avg rating 4.44 — 102 ratings — published 2010
Rate this book
Clear rating
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 2 times as network-security)
avg rating 4.48 — 605 ratings — published 2011
Rate this book
Clear rating
Extrusion Detection: Security Monitoring for Internal Intrusions Extrusion Detection: Security Monitoring for Internal Intrusions (Paperback)
by (shelved 2 times as network-security)
avg rating 4.33 — 54 ratings — published 2005
Rate this book
Clear rating
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort (Paperback)
by (shelved 2 times as network-security)
avg rating 4.05 — 56 ratings — published 2007
Rate this book
Clear rating
Real Digital Forensics: Computer Security and Incident Response Real Digital Forensics: Computer Security and Incident Response (Paperback)
by (shelved 2 times as network-security)
avg rating 4.20 — 92 ratings — published 2005
Rate this book
Clear rating
Network Security: A Hacker’s Perspective Network Security: A Hacker’s Perspective (Paperback)
by (shelved 2 times as network-security)
avg rating 4.13 — 155 ratings — published 2002
Rate this book
Clear rating
Cryptography and Network Security: Principles and Practice Cryptography and Network Security: Principles and Practice (Hardcover)
by (shelved 2 times as network-security)
avg rating 4.07 — 471 ratings — published 1998
Rate this book
Clear rating
CISSP All-in-One Exam Guide, Ninth Edition CISSP All-in-One Exam Guide, Ninth Edition (Hardcover)
by (shelved 1 time as network-security)
avg rating 4.80 — 10 ratings — published
Rate this book
Clear rating
C#TM Network Programming C#TM Network Programming (Paperback)
by (shelved 1 time as network-security)
avg rating 4.32 — 25 ratings — published 2002
Rate this book
Clear rating
ISA Server 2004 Unleashed ISA Server 2004 Unleashed (Paperback)
by (shelved 1 time as network-security)
avg rating 2.50 — 2 ratings — published 2005
Rate this book
Clear rating
CCENT/CCNA ICND1 100-105 Official Cert Guide CCENT/CCNA ICND1 100-105 Official Cert Guide (Kindle Edition)
by (shelved 1 time as network-security)
avg rating 4.25 — 163 ratings — published 2016
Rate this book
Clear rating
CompTIA Security+ SY0-701 Cert Guide (Certification Guide) CompTIA Security+ SY0-701 Cert Guide (Certification Guide)
by (shelved 1 time as network-security)
avg rating 4.00 — 2 ratings — published
Rate this book
Clear rating
Networking Essentials: MCSE Self-Paced Kit Networking Essentials: MCSE Self-Paced Kit (Paperback)
by (shelved 1 time as network-security)
avg rating 4.00 — 12 ratings — published 1997
Rate this book
Clear rating
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback)
by (shelved 1 time as network-security)
avg rating 3.86 — 21 ratings — published 2005
Rate this book
Clear rating
Cisco ASA Firewall Labs WorkBook: From Classic firewalling to FirePOWER Services Cisco ASA Firewall Labs WorkBook: From Classic firewalling to FirePOWER Services (Kindle Edition)
by (shelved 1 time as network-security)
avg rating 4.50 — 2 ratings — published
Rate this book
Clear rating
"It Always Seems Impossible Until It's Done.": Motivation for Dreamers & Doers "It Always Seems Impossible Until It's Done.": Motivation for Dreamers & Doers (Paperback)
by (shelved 1 time as network-security)
avg rating 4.14 — 72 ratings — published
Rate this book
Clear rating
CCNA Routing and Switching ICND2 200-105 Official Cert Guide CCNA Routing and Switching ICND2 200-105 Official Cert Guide (Kindle Edition)
by (shelved 1 time as network-security)
avg rating 4.28 — 74 ratings — published 2016
Rate this book
Clear rating
OSPF Routing Protocol in-depth analysis: Theory translated into practice OSPF Routing Protocol in-depth analysis: Theory translated into practice (Kindle Edition)
by (shelved 1 time as network-security)
avg rating 4.12 — 8 ratings — published 2014
Rate this book
Clear rating
Rate this book
Clear rating
Rate this book
Clear rating
CC Certified in Cybersecurity Study Guide (Sybex Study Guide) CC Certified in Cybersecurity Study Guide (Sybex Study Guide)
by (shelved 1 time as network-security)
avg rating 4.52 — 23 ratings — published
Rate this book
Clear rating
Foundations of Information Security: A Straightforward Introduction Foundations of Information Security: A Straightforward Introduction (Paperback)
by (shelved 1 time as network-security)
avg rating 4.06 — 126 ratings — published
Rate this book
Clear rating
Rate this book
Clear rating
Cybersecurity All-in-One For Dummies Cybersecurity All-in-One For Dummies (Kindle Edition)
by (shelved 1 time as network-security)
avg rating 3.46 — 24 ratings — published
Rate this book
Clear rating
How Cybersecurity Really Works: A Hands-On Guide for Total Beginners How Cybersecurity Really Works: A Hands-On Guide for Total Beginners (Paperback)
by (shelved 1 time as network-security)
avg rating 4.11 — 19 ratings — published
Rate this book
Clear rating
The Art of Network Penetration Testing: How to take over any company in the world The Art of Network Penetration Testing: How to take over any company in the world (Paperback)
by (shelved 1 time as network-security)
avg rating 4.21 — 14 ratings — published
Rate this book
Clear rating
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation (Paperback)
by (shelved 1 time as network-security)
avg rating 3.90 — 125 ratings — published 2017
Rate this book
Clear rating
CompTIA A+ Certification All-in-One Exam Guide, Exams 220-1001 & 220-1002 CompTIA A+ Certification All-in-One Exam Guide, Exams 220-1001 & 220-1002 (Kindle Edition)
by (shelved 1 time as network-security)
avg rating 4.30 — 254 ratings — published
Rate this book
Clear rating
TCP/IP Illustrated, Vol. 1: The Protocols (Addison-Wesley Professional Computing Series) TCP/IP Illustrated, Vol. 1: The Protocols (Addison-Wesley Professional Computing Series)
by (shelved 1 time as network-security)
avg rating 4.32 — 1,311 ratings — published 1993
Rate this book
Clear rating
Security Operations Center: Building, Operating, and Maintaining your SOC Security Operations Center: Building, Operating, and Maintaining your SOC (Kindle Edition)
by (shelved 1 time as network-security)
avg rating 3.93 — 29 ratings — published 2015
Rate this book
Clear rating
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance (Hardcover)
by (shelved 1 time as network-security)
avg rating 2.93 — 14 ratings — published 2011
Rate this book
Clear rating
Rate this book
Clear rating
CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide (Kindle Edition)
by (shelved 1 time as network-security)
avg rating 4.49 — 51 ratings — published
Rate this book
Clear rating
Network Basics for Hackers: How Networks Work and How They Break Network Basics for Hackers: How Networks Work and How They Break (Paperback)
by (shelved 1 time as network-security)
avg rating 4.50 — 22 ratings — published
Rate this book
Clear rating
The Dunwich Horror The Dunwich Horror (Paperback)
by (shelved 1 time as network-security)
avg rating 3.81 — 15,120 ratings — published
Rate this book
Clear rating


“In this fast-growing digital era, cybersecurity awareness must be introduced as part of the new social norms to the basic units of society because it is no longer an option but a crucial necessity.”
Bradley B Dalina

“In an age of dynamic malware obfuscation through operations such as mutating hash, a hyper-evolving threat landscape, and technologically next generation adversaries, offensive campaigns have an overwhelming advantage over defensive strategies.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

More quotes...