I can't learn enough about how TCP/IP packets appear at the hex and bit level. Call me crazy. That's what my job in network intrusion detection requires, so I appreciate authors like Richard Stevens and Eric Hall. These folks bring the details of TCP/IP to life, so I can apply that understanding to suspicious traffic. Eric's approach focuses on network monitor traces, nicely complementing Richard's TCPDumps. I would recommend checking O'Reilly's web site for the latest errata, even though none of the errors are enough to detract from this excellent reference work. I am actually more interested in seeing the companion volume, "Internet Application Protocols," as this is where some of the attack action occurs these days. Anyway, this book is in my top ten essential security reading list. Thank you Eric!
This book provides a lot of good detail information about the primary protocols used on TCP/IP networks. The extensive use of screen captures, protocol decodes, and interoperability notes makes it an excellent source for learning and troubleshooting Internet-based networks. Every network designer and manager should have this book in their reference library.
This is a good start on covering internet protocols, but it lacks completeness and up to date information for today's internet service providers. I needed a reference book on all internet protocols. If the book is going to cover internet protocols, it must be current and complete. Future editions , I am sure, will be written with this goal in mind.
I've found the book to be an excellent, well-written reference for the related protocols of the Internet. There is both development background and plenty of information for analyzing and/or troubleshooting your network. Highly recommended!