Network Field Survival Guide By Jay McGuerty - computer and network security

The best computer network & security pocket guide

for Jr. or Sr. network and security engineers, project managers, and instruction. The Network Field Guide has 210 pages and 4 feet of color foldouts stuffed into a 4 1/2″ x 3 3/8″ coil bound book that fits in any shirt pocket.

Filled with info you need to design & maintain LANS/WANS, configure routers, switches, manage & test your own security.

Written by Jay McGuerty who has over 20 years of commercial & DoD, network design, implementation, security & performance analysis, including five years supporting the White House Communications Agency.

Add Your Customized Logo Free

Add a custom logo for FREE to the cover of your guide. Great for corporations, businesses, consultants, or anyone who wants to brand their computer network and security guide.

Get Yours Now!

The Perfect Network and Security Guide That Fits In Your Pocket

Network and computer security guide for shellcode delivery hi-jacking

New Color foldout depicting shell code delivery hi-jacking the instruction pointer.

Panoramic view of the entire Server Browser and potential attack on the network through security

A view to a website kill. Panoramic view of the entire Server/Browser eco system in a 2.5 Ft color foldout diagram. Get the BIG PICTURE Literally!

network and computer security guide for attack flow during a pen test or inner workings of the telco service provider cloud

One side of the 2.5 foot detailed color diagram that shows you attack flow during a pen test or the inner workings of the Telco/service provider “cloud.”

Chapters You Will Not Find in Any Other Book

Anatomy of a “T1” Circuit (Color fold out)
A “virtual” visit down to the last detail of a typical Telco MPOE

“A View To A Web-Site Kill” (Color fold out)
A Panoramic view of the entire Server/Browser food chain

Cisco/Juniper/Foundry Switch & Router Equivalents
Translate one vendors products into another equivalent

What Changed? Solving “mysterious” Network outages
Re-Defining what and how “Un-Authorized” changes happen..

Finding your “Bad self” Basic Pen-Testing
Helping honest law abiding security engineers view their network as a black hat would


The automated premier software program for Pen Testing that answers the question WHERE TO START. sHack manages, analyzes and provides click-to-enagage capability accelerating target engagement.

sHack Demo Video 1

sHack Installation Demo

sHack Demo Video 2

Runs fully in Linux, Auto-Config in Kali

Windows, Analytics only

IPv6 Addressing Reference Download

Download a FREE copy of the IPv6 Addressing Reference page from the computer network and security pocket guide. We know the value you will get from this download will get you to buy the guide.

The Network Field Survival Guide covers:


Network Basics

Router and Switch Configuration


Routing Protocalls


Pen Testing

Cyber Seucrity Laws





Wireless Installs





CO and Facility Wiring




Firewall & IDS strategies

Virtual Private Networks (VPN's)

Threat Mitigation

Network Managment

And More

NFSG Has Everything You Need

A great reference and powerful tool during configuration,design meetings & conference calls.
Whether you need to configure a router, set up firewall rules or dissect a packet capture NFSG has it.

The book has it all.  A one-stop reference source…


I’ve been using your books for years now, but since other people always find them so valuable
I often find myself giving them away or turning around and they’ve disappeared from my desk….


I learned of your book from looking at a colleague’s copy that he got at Black Hat this year.
You’ve done a great job at condensing so much information into a portable reference guide.
I’m looking forward to getting to look through it fully…. 


One of my colleagues picked up a copy at Defcon and I was insanely jealous!…


Learn how to find the cause of those mysterious “NOTHING CHANGED” outages. NFSG’s poor mans  network and security troubleshooting tips show you how to change your mental perspective to think beyond the “usual suspects” that limit your ability to find the root cause. Expand your boundaries of how you view the problem.