As this is a curated collection of books from a personal library, please be mindful that some books may be out of print, have more current editions, or be available in digital formats. A large portion of the books presented are related to research and reference.

Project Management


Image

Objectives: The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer’s business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you understand traffic flow, protocol behavior, and internetworking technologies. After completing this book, you will be equipped to design enterprise networks that meet a customer’s requirements for functionality, capacity, performance, availability, scalability, affordability, security, and manageability.Audience: This book is for you if you are an internetworking professional responsible for designing and maintaining medium- to large-sized enterprise networks. If you are a network engineer, architect, or technician who has a working knowledge of network protocols and technologies, this book will provide you with practical advice on applying your knowledge to internetwork design.This book also includes useful information for consultants, systems engineers, and sales engineers who design corporate networks for clients. In the fast-paced presales environment of many systems engineers, it often is difficult to slow down and insist on a top-down, structured systems analysis approach. Wherever possible, this book includes shortcuts and assumptions that can be made to speed up the network design process.Finally, this book is useful for undergraduate and graduate students in computer science and information technology disciplines. Students who have taken one or two courses in networking theory will find Top-Down Network Design, Third Edition, an approachable introduction to the engineering and business issues related to developing real-world networks that solve typical business problems.Changes for the Third Edition: Networks have changed in many ways since the second edition was published. Many legacy technologies have disappeared and are no longer covered in the book. In addition, modern networks have become multifaceted, providing support for numerous bandwidth-hungry applications and a variety of devices, ranging from smart phones to tablet PCs to high-end servers. Modern users expect the network to be available all the time, from any device, and to let them securely collaborate with coworkers, friends, and family. Networks today support voice, video, high-definition TV, desktop sharing, virtual meetings, online training, virtual reality, and applications that we can’t even imagine that brilliant college students are busily creating in their dorm rooms.As applications rapidly change and put more demand on networks, the need to teach a systematic approach to network design is even more important than ever. With that need in mind, the third edition has been retooled to make it an ideal textbook for college students. The third edition features review questions and design scenarios at the end of each chapter to help students learn top-down network design.

Image

Software Defined Networks discusses the historical networking environment that gave rise to SDN, as well as the latest advances in SDN technology. The book gives you the state of the art knowledge needed for successful deployment of an SDN, including:


  • How to explain to the non-technical business decision makers in your organization the potential benefits, as well as the risks, in shifting parts of a network to the SDN model
  • How to make intelligent decisions about when to integrate SDN technologies in a network
  • How to decide if your organization should be developing its own SDN applications or looking to acquire these from an outside vendor
  • How to accelerate the ability to develop your own SDN application, be it entirely novel or a more efficient approach to a long-standing problem
  • Discusses the evolution of the switch platforms that enable SDN
  • Addresses when to integrate SDN technologies in a network
  • Provides an overview of sample SDN applications relevant to different industries
  • Includes practical examples of how to write SDN applications


Image

Wireshark is the world's most popular network analyzer tool with over 1 million downloads per month. As the Founder of Wireshark University, Laura Chappell is undoubtedly one of the best Wireshark instructors around.In this updated book, Laura offers step-by-step instructions on the key functions and features of Wireshark, including:

  • Filter on addresses, protocols, fields or traffic characteristics
  • Create custom columns for more efficient analysis
  • Find the source of delays with filters and coloring rules
  • Perform unattended captures with auto-stop conditions
  • Filter on keywords using wildcards and regular expressions
  • Graph and compare user, subnet and application traffic
  • Reassemble and extract a file from captured traffic
  • Identify DNS and HTTP errors fast
  • Export important packet details to .csv format
  • ...and more

This book includes 46 step-by-step Labs to quickly bring you up to speed with Wireshark version 2 regardless of whether you are a newbie or already working with Wireshark today!

Image

Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot performance issues fast - no more finger pointing because the packets never lie! From "Death by Database" to "Troubleshooting Time Syncing," 49 case studies offer insight into performance and security situations solved with Wireshark. Learn to customize Wireshark for faster and more accurate analysis of your network traffic. Build graphs to identify and expose issues such as packet loss, receiver congestion, slow server response, network queuing and more. This book is the Official Study Guide for the Wireshark Certified Network Analyst program.


Image

This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV. Presenting a comprehensive guide to the application of security mechanisms in the context of SDNFV, the content spans fundamental theory, practical solutions, and potential applications in future networks.Topics and features: introduces the key security challenges of SDN, NFV and Cloud Computing, providing a detailed tutorial on NFV security; discusses the issue of trust in SDN/NFV environments, covering roots of trust services, and proposing a technique to evaluate trust by exploiting remote attestation; reviews a range of specific SDNFV security solutions, including a DDoS detection and remediation framework, and a security policy transition framework for SDN; describes the implementation of a virtual home gateway, and a project that combines dynamic security monitoring with big-data analytics to detect network-wide threats; examines the security implications of SDNFV in evolving and future networks, from network-based threats to Industry 4.0 machines, to the security requirements for 5G; investigates security in the Observe, Orient, Decide and Act (OODA) paradigm, and proposes a monitoring solution for a Named Data Networking (NDN) architecture; includes review questions in each chapter, to test the reader’s understanding of each of the key concepts described.This informative and practical volume is an essential resource for researchers interested in the potential of SDNFV systems to address a broad range of network security challenges. The work will also be of great benefit to practitioners wishing to design secure next-generation communication networks, or to develop new security-related mechanisms for SDNFV systems.

Image

This practical text/reference provides an exhaustive guide to setting up and sustaining software-defined data centers (SDDCs). Each of the core elements and underlying technologies are explained in detail, often supported by real-world examples. The text illustrates how cloud integration, brokerage, and orchestration can ensure optimal performance and usage of data resources, and what steps are required to secure each component in a SDDC. The coverage also includes material on hybrid cloud concepts, cloud-based data analytics, cloud configuration, enterprise DevOps and code deployment tools, and cloud software engineering.Topics and features: highlights how technologies relating to cloud computing, IoT, blockchain, and AI are revolutionizing business transactions, operations, and analytics; introduces the concept of Cloud 2.0, in which software-defined computing, storage, and networking are applied to produce next-generation cloud centers; examines software-defined storage for storage virtualization, covering issues of cloud storage, storage tiering, and deduplication; discusses software-defined networking for network virtualization, focusing on techniques for network optimization in data centers; reviews the qualities and benefits of hybrid clouds, that bridge private and public cloud environments; investigates the security management of a software-defined data center, and proposes a framework for managing hybrid IT infrastructure components; describes the management of multi-cloud environments through automated tools, and cloud brokers that aim to simplify cloud access, use and composition; covers cloud orchestration for automating application integration, testing, infrastructure provisioning, software deployment, configuration, and delivery.This comprehensive work is an essential reference for all practitioners involved with software-defined data center technologies, hybrid clouds, cloud service management, cloud-based analytics, and cloud-based software engineering.


Image

Appropriate for all introductory-to-intermediate courses in computer networking, the Internet, or Internet applications; readers need no background in networking, operating systems, or advanced mathematics.Leading networking authority Douglas Comer presents a wide-ranging, self-contained tour of the concepts, principles, and technologies that enable today’s Internet to support applications ranging from web browsing to telephony and multimedia. Comer begins by illuminating the applications and facilities offered by today’s Internet. Next, he systematically introduces the underlying network technologies and protocols that make them possible. With these concepts and technologies established, he introduces several of the most important contemporary issues faced by network implementers and managers, including quality of service, Internet telephony, multimedia, network security, and network management. Comer has carefully designed this book to support both top-down and bottom-up teaching approaches. Students need no background in operating systems, and no sophisticated math: Comer relies throughout on figures, drawings, examples, and analogies, not mathematical proofs.Teaching and Learning ExperienceThis program will provide a better teaching and learning experience—for you and your students.


  • Broad Coverage of Key Concepts and Principles, Presented in a Technology-independent Fashion: Comer focuses on imparting knowledge that students will need regardless of which technologies emerge or become obsolete.
  • Flexible Organization that Supports both Top-down and Bottom-up Teaching Approaches: Chapters may be sequenced to accommodate a wide variety of course needs and preferences.
  • An Accessible Presentation that Resonates with Students: Comer relies throughout on figures, drawings, examples, and analogies, not mathematical proofs.
  • Keep Your Course Current: Content is refreshed to provide the most up-to-date information on new technologies for your course.

My Library has the 1st Edition of this textbook, which is out of print.


Image

Cisco Networking Essentials, 2nd Edition provides the latest for those beginning a career in networking. This book provides the fundamentals of networking and leads you through the concepts, processes, and skills you need to master fundamental networking concepts. Thinking of taking the CCENT Cisco Certified Entry Networking Technician ICND1 Exam 100-101? This book has you covered! With coverage of important topics and objectives, each chapter outlines main points and provides clear, engaging discussion that will give you a sound understanding of core topics and concepts. End-of-chapter review questions and suggested labs help reinforce what you've learned, and show you where you may need to backtrack and brush up before exam day.Cisco is the worldwide leader in networking products and services, which are used by a majority of the world's companies. This book gives you the skills and understanding you need to administer these networks, for a skillset that will serve you anywhere around the globe.


  • Understand fundamental networking concepts
  • Learn your way around Cisco products and services
  • Gain the skills you need to administer Cisco routers and switches
  • Prepare thoroughly for the CCENT exam

If you're interested in becoming in-demand, network administration is the way to go; if you want to develop the skillset every company wants to hire, Cisco Networking Essentials, 2nd Edition gets you started working with the most widespread name in the business.


My Library has the 1st edition.




As a working cybersecurity professional, every attempt is made to separate professional and personal endeavors in a manner consistent with reducing conflicts of interest and maintaining ethics. Statements contained within this site are the explicit and implicit goals, objectives, endorsements, and educated opinion of the author of this site and not those of current or former employers.


Image
© 2025 James J. Fisher, All Rights Reserved. Contact Me


This site only uses session cookies for maintaining the state of each page. Users are not tracked, and information is not stored, processed, or analyzed for any other purpose. However, third parties linked to this site may use tracking cookies and techniques outside of the realm of control for this site.