Cargando…

Wireshark for network forensics : an essential guide for IT and cloud professionals /

With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Nainar, Nagendra Kumar (Autor), Panda, Ashish (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Apress, [2023]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1356910201
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 230105s2023 nyua ob 001 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d EBLCP  |d YDXIT  |d GW5XE  |d YDX  |d UKAHL  |d OCLCF  |d OCLCO 
019 |a 1356795681  |a 1356797317 
020 |a 9781484290019  |q (electronic bk.) 
020 |a 1484290011  |q (electronic bk.) 
020 |z 9781484290002 
020 |z 1484290003 
024 7 |a 10.1007/978-1-4842-9001-9  |2 doi 
029 1 |a AU@  |b 000073290272 
029 1 |a AU@  |b 000073396841 
035 |a (OCoLC)1356910201  |z (OCoLC)1356795681  |z (OCoLC)1356797317 
037 |a 9781484290019  |b O'Reilly Media 
050 4 |a TK5105.59  |b .N35 2023 
072 7 |a U  |2 bicssc 
072 7 |a COM051390  |2 bisacsh 
072 7 |a ULJ  |2 thema 
082 0 4 |a 005.8  |2 23/eng/20230105 
049 |a UAMI 
100 1 |a Nainar, Nagendra Kumar,  |e author. 
245 1 0 |a Wireshark for network forensics :  |b an essential guide for IT and cloud professionals /  |c Nagendra Kumar Nainar, Ashish Panda. 
264 1 |a New York, NY :  |b Apress,  |c [2023] 
300 |a 1 online resource (283 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. 
588 |a Description based on online resource; title from digital title page (viewed on January 17, 2023). 
505 0 |a Ch1:Wireshark Primer -- Ch 2: Packet Capture and Analysis -- Ch 3: Capturing Secured Application for Analysis -- Ch 4: Wireless Packet Capture and Analysis -- Ch 5: Multimedia Capture and Analysis -- Ch 6:Cloud and Cloud-Native Traffic Capture -- Ch 7: Bluetooth Protocol Capture and Analysis -- Ch 8: Wireshark Analysis and Network Forensic. - Ch 9: Writing your own Dissector. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures  |2 fast 
700 1 |a Panda, Ashish,  |e author. 
776 0 8 |c Original  |z 1484290003  |z 9781484290002  |w (OCoLC)1346530442 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484290019/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH41098310 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL7165592 
938 |a YBP Library Services  |b YANK  |n 304081664 
994 |a 92  |b IZTAP