MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn946526530
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 160412t20162016enka o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d YDXCP  |d IDEBK  |d KSU  |d DEBSZ  |d DEBBG  |d C6I  |d OCLCQ  |d OCLCF  |d CEF  |d YDX  |d N$T  |d AGLDB  |d IGB  |d RDF  |d UKMGB  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBC1I7403  |2 bnb 
016 7 |a 018007117  |2 Uk 
019 |a 946006576  |a 946106464 
020 |a 178398953X  |q electronic book 
020 |a 9781783989539  |q (electronic bk.) 
020 |z 9781783989522 
020 |z 1783989521 
029 1 |a DEBSZ  |b 480365083 
029 1 |a DEBBG  |b BV043969192 
029 1 |a DEBSZ  |b 485797062 
029 1 |a GBVCP  |b 882754599 
029 1 |a AU@  |b 000067090324 
029 1 |a UKMGB  |b 018007117 
035 |a (OCoLC)946526530  |z (OCoLC)946006576  |z (OCoLC)946106464 
037 |a CL0500000732  |b Safari Books Online 
050 4 |a TK5105.55  |b .M57 2016 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004.6/2  |2 23 
049 |a UAMI 
100 1 |a Mishra, Charit,  |e author. 
245 1 0 |a Mastering Wireshark :  |b analyze data network like a professional by mastering Wireshark, from 0 to 1337 /  |c Charit Mishra. 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2016. 
264 4 |c ©2016 
300 |a 1 online resource (ix, 291 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Community experience distilled 
500 |a Includes index. 
520 8 |a Annotation  |b Analyze data network like a professional by mastering Wireshark - From 0 to 1337About This Book Master Wireshark and train it as your network sniffer Impress your peers and get yourself pronounced as a network doctor Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network anomaliesWho This Book Is ForAre you curious to know what's going on in a network? Do you get frustrated when you are unable to detect the cause of problems in your networks? This is where the book comes into play.Mastering Wireshark is for developers or network enthusiasts who are interested in understanding the internal workings of networks and have prior knowledge of using Wireshark, but are not aware about all of its functionalities.What You Will Learn Install Wireshark and understand its GUI and all the functionalities of it Create and use different filters Analyze different layers of network protocols and know the amount of packets that flow through the network Decrypt encrypted wireless traffic Use Wireshark as a diagnostic tool and also for network security analysis to keep track of malware Troubleshoot all the network anomalies with help of Wireshark Resolve latencies and bottleneck issues in the networkIn DetailWireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form.Mastering Wireshark will help you raise your knowledge to an expert level. At the start of the book, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the book, you'll be mastering the features of Wireshark, analyzing different layers of the network protocol, looking for any anomalies. As you reach to the end of the book, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes.Style and approach Every chapter in this book is explained to you in an easy way accompanied by real-life examples and screenshots of the interface, making it easy for you to become an expert at using Wireshark. 
588 |a Description based on online resource; title from digital title page (viewed on August 14, 2018). 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Welcome to the World of Packet Analysis with Wireshark; Introduction to Wireshark; A brief overview of the TCP/IP model; The layers in the TCP/IP model; An introduction to packet analysis with Wireshark; How to do packet analysis; What is Wireshark?; How it works; Capturing methodologies; Hub-based networks; The switched environment; ARP poisoning; Passing through routers; Why use Wireshark?; The Wireshark GUI; The installation process; Starting our first capture 
505 8 |a Working with IO, Flow, and TCP stream graphsIO graphs; Flow graphs; TCP stream graphs; Round-trip time graphs; Throughput graphs; The Time-sequence graph (tcptrace); Follow TCP streams; Expert Infos; Command Line-fu; Summary; Exercise; Chapter 4: Inspecting Application Layer Protocols; Domain name system; Dissecting a DNS packet; Dissecting DNS query/response; Unusual DNS traffic; File transfer protocol; Dissecting FTP communications; Passive mode; Active mode; Dissecting FTP packets; Unusual FTP; Hyper Text Transfer Protocol; How it works -- request/response; Request; Response 
505 8 |a Unusual HTTP trafficSimple Mail Transfer Protocol; Usual versus unusual SMTP traffic; Session Initiation Protocol and Voice Over Internet Protocol; Analyzing VOIP traffic; Reassembling packets for playback; Unusual traffic patterns; Decrypting encrypted traffic (SSL/TLS); Summary; Practice questions:; Chapter 5: Analyzing Transport Layer Protocols; The transmission control protocol; Understanding the TCP header and its various flags; How TCP communicates; How it works; Graceful termination; RST (reset) packets; Relative verses Absolute numbers; Unusual TCP traffic 
505 8 |a How to check for different analysis flags in WiresharkThe User Datagram Protocol; A UDP header; How it works; The DHCP; The TFTP; Unusual UDP traffic; Summary; Practice questions; Chapter 6: Analyzing Traffic in Thin Air; Understanding IEEE 802.11; Various modes in wireless communications; Wireless interference and strength; The IEEE 802.11 packet structure; RTS/CTS; Usual and unusual WEP -- open/shared key communication; WEP-open key; The shared key; WPA-Personal; WPA-Enterprise; Decrypting WEP and WPA traffic; Summary; Practice questions; Chapter 7: Network Security Analysis 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer network protocols. 
650 0 |a Packet switching (Data transmission) 
650 0 |a Computer networks  |x Monitoring. 
650 0 |a Packet transport networks. 
650 6 |a Protocoles de réseaux d'ordinateurs. 
650 6 |a Commutation de paquets. 
650 6 |a Réseaux d'ordinateurs  |x Surveillance. 
650 7 |a COMPUTERS / Computer Literacy  |2 bisacsh 
650 7 |a COMPUTERS / Computer Science  |2 bisacsh 
650 7 |a COMPUTERS / Data Processing  |2 bisacsh 
650 7 |a COMPUTERS / Hardware / General  |2 bisacsh 
650 7 |a COMPUTERS / Information Technology  |2 bisacsh 
650 7 |a COMPUTERS / Machine Theory  |2 bisacsh 
650 7 |a COMPUTERS / Reference  |2 bisacsh 
650 7 |a Computer network protocols  |2 fast 
650 7 |a Computer networks  |x Monitoring  |2 fast 
650 7 |a Packet switching (Data transmission)  |2 fast 
650 7 |a Packet transport networks  |2 fast 
830 0 |a Community experience distilled. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781783989522/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 12925501 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis34330418 
938 |a EBSCOhost  |b EBSC  |n 1214598 
994 |a 92  |b IZTAP