|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_on1302125866 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
220306s2022 caua o 000 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|e pn
|c YDX
|d ORMDA
|d GW5XE
|d YDX
|d EBLCP
|d OCLCO
|d OCLCF
|d N$T
|d K6U
|d UKAHL
|d OCLCQ
|d ORMDA
|
019 |
|
|
|a 1302102075
|a 1302183245
|a 1302515459
|a 1302581368
|a 1302697168
|a 1302740119
|a 1302953332
|a 1302984792
|
020 |
|
|
|a 9781484280027
|q (electronic bk.)
|
020 |
|
|
|a 1484280024
|q (electronic bk.)
|
020 |
|
|
|z 9781484280010
|
020 |
|
|
|z 1484280016
|
024 |
7 |
|
|a 10.1007/978-1-4842-8002-7
|2 doi
|
029 |
1 |
|
|a AU@
|b 000071246083
|
029 |
1 |
|
|a AU@
|b 000071435869
|
035 |
|
|
|a (OCoLC)1302125866
|z (OCoLC)1302102075
|z (OCoLC)1302183245
|z (OCoLC)1302515459
|z (OCoLC)1302581368
|z (OCoLC)1302697168
|z (OCoLC)1302740119
|z (OCoLC)1302953332
|z (OCoLC)1302984792
|
037 |
|
|
|a 9781484280027
|b O'Reilly Media
|
050 |
|
4 |
|a TK5105.55
|b .J35 2022
|
072 |
|
7 |
|a COM051390
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6/2
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Jain, Vinit,
|e author.
|
245 |
1 |
0 |
|a Wireshark fundamentals :
|b a network engineer's handbook to analyzing network traffic /
|c Vinit Jain.
|
264 |
|
1 |
|a [Berkeley] :
|b Apress,
|c [2022]
|
264 |
|
4 |
|c ©2022
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Understand the fundamentals of the Wireshark tool that is key for network engineers and network security analysts. This book explains how the Wireshark tool can be used to analyze network traffic and teaches you network protocols and features. Author Vinit Jain walks you through the use of Wireshark to analyze network traffic by expanding each section of a header and examining its value. Performing packet capture and analyzing network traffic can be a complex, time-consuming, and tedious task. With the help of this book, you will use the Wireshark tool to its full potential. You will be able to build a strong foundation and know how Layer 2, 3, and 4 traffic behave, how various routing protocols and the Overlay Protocol function, and you will become familiar with their packet structure. Troubleshooting engineers will learn how to analyze traffic and identify issues in the network related to packet loss, bursty traffic, voice quality issues, etc. The book will help you understand the challenges faced in any network environment and how packet capture tools can be used to identify and isolate those issues. This hands-on guide teaches you how to perform various lab tasks. By the end of the book, you will have in-depth knowledge of the Wireshark tool and its features, including filtering and traffic analysis through graphs. You will know how to analyze traffic, find patterns of offending traffic, and secure your network. What You Will Learn Understand the architecture of Wireshark on different operating systems Analyze Layer 2 and 3 traffic frames Analyze routing protocol traffic Troubleshoot using Wireshark Graphs Who This Book Is For Network engineers, security specialists, technical support engineers, consultants, and cyber security engineers.
|
505 |
0 |
|
|a Ch1:Introduction to Wireshark -- Ch 2: Getting Familiar with Wireshark -- Ch 3: Analyzing Layer-2 and Layer-3 Traffic -- Ch 4: Analyzing Layer-4 Traffic -- Ch 5: Analyzing Routing Protocol Traffic.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer network protocols.
|
650 |
|
0 |
|a Packet switching (Data transmission)
|
650 |
|
0 |
|a Computer networks
|x Monitoring.
|
650 |
|
0 |
|a Packet transport networks.
|
650 |
|
6 |
|a Protocoles de réseaux d'ordinateurs.
|
650 |
|
6 |
|a Commutation de paquets.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Surveillance.
|
650 |
|
7 |
|a Computer network protocols.
|2 fast
|0 (OCoLC)fst00872279
|
650 |
|
7 |
|a Computer networks
|x Monitoring.
|2 fast
|0 (OCoLC)fst01765706
|
650 |
|
7 |
|a Packet switching (Data transmission)
|2 fast
|0 (OCoLC)fst01050222
|
650 |
|
7 |
|a Packet transport networks.
|2 fast
|0 (OCoLC)fst01764251
|
776 |
0 |
8 |
|i Print version:
|z 1484280016
|z 9781484280010
|w (OCoLC)1288668162
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484280027/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH39903130
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6912977
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 302760994
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3189678
|
994 |
|
|
|a 92
|b IZTAP
|