More e-Books from National CyberWatch Center

National CyberWatch partnered with Jones & Bartlett Learning (JBL) to create the following e-Books:


New Book: Network Warrior, 2nd Edition

Network Warrior, Second Edition discusses what readers can do after they’ve passed certification exams and realize that theory alone won’t help them on the job.

Topics include:

  • An in-depth view of routers and routing
  • Switching, using Cisco Catalyst and Nexus switches as examples
  • SOHO VoIP and SOHO wireless access point design and configuration
  • Introduction to IPv6 with configuration examples
  • Telecom technologies in the data communications world (e.g. T1,Fframe Relay, and MPLS)
  • Security, firewall theory, and configuration, as well as ACL and authentication
  • Quality of Service (QoS), with an emphasis on Low-Latency Queuing (LLQ)
  • IP address allocation, Network Time Protocol (NTP), and device failures

New Book: Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

The revised and second edition of Practical Packet Analysis (published by No Starch Press), teaches the reader, using Wireshark and 45 new scenarios , how to analyze packets in order to better understand network communication and troubleshoot network problems. In addition, readers learn how to:

  • Use packet analysis to identify and resolve common network problems like loss of connectivity, DNS issues, sluggish speeds, and malware infections
  • Build customized capture and display filters
  • Monitor their network in real-time and tap live network communications
  • Graph traffic patterns to visualize the data flowing across their network
  • Use advanced Wireshark features to understand confusing captures
  • Build statistics and reports to help them better explain technical network information to non-techies

:: Must Have Security-Related Books

I know, textbooks are so 80s, but IMHO, no security professional/student should be w/o the following books in their library (these are in no particular order):

:: Hacking Exposed Series by McGraw-Hill:

:: Counter Hack Reloaded

:: Hacking: The Art of Exploitation, Second Edition

:: Google Hacking for Penetration Testers, Vol. 2

:: Hacker’s Challenge 2: Test Your Network Security and Forensic Skills

:: Hacker’s Challenge 3: 20 Brand New Forensic Scenarios and Solutions

:: Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

:: Dragon Bytes: Chinese Information War Theory and Practice – check your local library for copies (tough to find online)

:: The Art of War

:: Wi-Foo II: The Secrets of Wireless Hacking

:: Network Intrusion Detection, Third Edition

:: Intrusion Signatures and Analysis

:: The Tao of Network Security Monitoring: Beyond Intrusion Detection

:: Real Digital Forensics: Computer Security and Incident Response

:: Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition

:: The Shellcoder’s Handbook: Discovering and Exploiting Security Holes

:: The Database Hacker’s Handbook: Defending Database Servers

:: The Web Application Hacker s Handbook: Discovering and Exploiting Security Flaws

:: TCP/IP Illustrated, Volume 1: The Protocols

:: Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture, Fourth Edition

:: Modern Operating Systems, Third Edition

:: Where Wizards Stay Up Late

Where Wizards Stay Up Late: The Origins of the Internet is the story of the small group of researchers and engineers whose invention, daring in its day, became the foundation for the Internet. With ARPA’s backing, the quest for a way to connect computers across the country began.

“Thirty years ago, interactive computer networks did not exist anywhere — except in the minds of a handful of computer scientists. In 1966, the Defense Department’s Advanced Research Projects Agency funded a project to create computer communication among its university-based researchers. The experiment was inspired by J.C.R. Licklider, a brilliant research scientist from MIT, and Robert Taylor, the Director of the ARPA office that funded it. At a time when computers were generally regarded as nothing more than giant calculators, Licklider and Taylor saw their potential as communications devices.”