|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1348103535 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
221018s2017 xx 093 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d UMI
|d TOH
|d S9I
|d OCLCO
|
019 |
|
|
|a 1019685175
|a 1362789315
|
020 |
|
|
|a 9781492029182
|q (electronic video)
|
020 |
|
|
|a 1492029181
|q (electronic video)
|
029 |
1 |
|
|a AU@
|b 000073549809
|
035 |
|
|
|a (OCoLC)1348103535
|z (OCoLC)1019685175
|z (OCoLC)1362789315
|
037 |
|
|
|a 9781492029182
|b O'Reilly Media
|
050 |
|
4 |
|a HV8079.C65
|
082 |
0 |
4 |
|a 363.25/968
|2 23/eng/20221018
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Capture and analysis of network-based evidence.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly Media, Inc.,
|c [2017]
|
300 |
|
|
|a 1 online resource (1 video file (1 hr., 33 min.)) :
|b sound, color.
|
306 |
|
|
|a 013300
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Messier, Ric, presenter.
|
520 |
|
|
|a In our globally connected and online world today, massive amounts of data flow across countless networks. Much of that data is ephemeral, meaning that after it has passed across the network, it's gone. For law enforcement and IT professionals who are engaged in digital forensic investigations, understanding how to read the data transmitted on a network is crucial to carrying out their task. This is especially important in the case of incident response and corporate investigations and can help in identifying unauthorized intrusions on a network. If want to become part of the ever-growing ranks of digital investigators and you have entry- to intermediate-level computer skills, this course will show you how to use the industry-favorite tool Wireshark to capture and analyze network traffic. You'll learn how to extract files from the "packets" that make up digital transmissions over a network. And, you'll see how to locate and identify the important header information and metadata contained in those packets.
|
588 |
0 |
|
|a Online resource; title from title details screen (O'Reilly, viewed October 18, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Hacking.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
655 |
|
2 |
|a Webcast
|
655 |
|
7 |
|a Instructional films
|2 fast
|
655 |
|
7 |
|a Internet videos
|2 fast
|
655 |
|
7 |
|a Nonfiction films
|2 fast
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
655 |
|
7 |
|a Films de formation.
|2 rvmgf
|
655 |
|
7 |
|a Films autres que de fiction.
|2 rvmgf
|
655 |
|
7 |
|a Vidéos sur Internet.
|2 rvmgf
|
700 |
1 |
|
|a Messier, Ric,
|e presenter.
|
710 |
2 |
|
|a O'Reilly (Firm),
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781492029182/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|