Introduction - If you have any usage issues, please Google them yourself
" Network security programming techniques and examples" of the book source, details of the TCP/IP protocol enough to use the various protocols, and network security practices, really good!