Let’s be honest: As a network manager, you’re responsible for knowing a little bit about everything when it comes to computer networking. From fundamentals to anticipating future tech changes, there’s a lot of ground to cover. To keep up, you need to keep learning. If you’re wondering where to start, this list of 10 computer networking books can help. When you’re done reading, you’ll have a fresh perspective on the basics of general networking, network management, network monitoring, security, and more. Take a look:


Network

1. Network Manager’s Handbook

by Nathan Muller

From the back of the book: The skills of a network manager can literally make or break a company, yet most enter their job completely unprepared. While most schools and references are limited to teaching networking technologies, this Handbook covers everything from strategic planning to documentation, retrofitting, and ‘managing up.’




Computer

2. Computer Networking Problems and Solutions

by Russ White and Ethan Banks

From the back of the book: Computer Networking Problems and Solutions offers a new approach to understanding networking that not only illuminates current systems but prepares readers for whatever comes next. Its problem-solving approach reveals why modern computer networks and protocols are designed as they are, by explaining the problems any protocol or system must overcome, considering common solutions, and showing how those solutions have been implemented in new and mature protocols.

“I’ve read and worked through countless technical books. This is the best! A must read for improving and veteran engineers alike.” – Joey C.




IPv6

3. IPv6 Fundamentals

by Rick Graziani

From the back of the book: Organizations are increasingly transitioning to IPv6, the next generation protocol for defining how devices of all kinds communicate over networks. IPv6 Fundamentals offers a thorough, friendly, and easy-to-understand introduction to the knowledge and skills you need to deploy and operate IPv6 networks.

“This book should be the first book on the list of anyone that wants to learn IPv6.” – Miguel V.

Easy extra reading: Network engineer Kevin Dooley explains what every network admin should know about IPv6.



IP

4. IP Subnetting: From Zero to Guru

by Paul Browning

From the back of the book: IP subnetting is a subject you need to master if you want to enjoy a successful career in IT. Unfortunately, it’s also one of the hardest to learn: you must understand binary math, hexadecimal, address classes, private addressing, IPv6, and many other topics.

“I’ve always struggled to get subnetting to sink in. This book was finally the key to it all sinking in. Paul makes it so, so simple to remember.” – Grant D.

Easy extra reading: Kevin Dooley gives you a simple subnetting overview.




IT

5. IT Auditing Using Controls to Protect Information Assets

by Mike Kegerreis, Mike Schiller, and Chris Davis

From the back of the book: Fully updated to cover leading-edge tools and technologies, IT Auditing explains, step by step, how to implement a successful, enterprise-wide IT audit program. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates.

IT Auditing provides a systematic and straight forward approach to performing a comprehensive audit to ensure the security of digital assets and data. IT Auditing is the most comprehensive resource I’ve seen. I highly recommend it.” – Billy R.




Practical

6. Practical Monitoring: Effective Strategies for the Real World

by Mike Julian

From the back of the book: Learn a practical approach to designing and implementing effective monitoring—from your enterprise application down to the hardware in a datacenter, and everything between. Practical Monitoring provides you with straightforward strategies and tactics for designing and implementing a strong monitoring foundation for your company.

“Mike Julian provides a very good discussion of what a monitoring system consists of, where logging and alerting fit in, and solid advice on building out a monitoring platform. The book is equally useful if you are starting from scratch, or if you are looking for ways to modernize your existing (and possibly dysfunctional) monitoring.” – Anonymous




Defensive

7. Defensive Security Handbook

by Lee Brotherston and Amanda Berlin

From the back of the book: Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security program, forcing them to learn on the job. This pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.

“I cannot tell you how appreciative I am of this book and its authors. In fact, I was so impressed with this book I ordered 2 more and made it assigned reading for my newest team members.” – Brandon B.



Wireless

8. Wireless and Mobile Device Security

by Jim Doherty

From the back of the book: The growing use of mobile devices demands that organizations become more educated in securing this growing technology and determining how to best protect their assets. Wireless and Mobile Device Security explores the evolution of wired networks to wireless networking and its impact on the corporate world.




Applied

9. Applied Network Security Monitoring

by Chris Sanders and Jason Smith

From the back of the book: Network security monitoring is based on the principle that prevention eventually fails. This book follows the three stages of the NSM cycle: collection, detection, and analysis.

“I feel like everything I need to know is in [this book]. It’s almost like a reference book. Find the subject you’re looking for and it will tell you everything you need to know to start searching online for help with your particulars.” – Robert K.



Zero

10. Zero Trust Networks: Building Secure Systems in Untrusted Networks

by Evan Gilman and Doug Barth

From the back of the book: Network security monitoring is based on the principle that prevention eventually fails. This book follows the three stages of the NSM cycle: collection, detection, and analysis.

“This book really re-shaped my way of thinking about network security. I learned a lot, and now I know what to go after as far as the actual implementation details, tools and frameworks for my company.” – Greg G.


Learn more: Security expert Nick Espinosa breaks down the benefits and risks of zero trust networks in an on-demand webinar.

Happy reading!