語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Wireshark for network forensics = an...
~
Nainar, Nagendra Kumar.
FindBook
Google Book
Amazon
博客來
Wireshark for network forensics = an essential guide for IT and cloud professionals /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Wireshark for network forensics/ by Nagendra Kumar Nainar, Ashish Panda.
其他題名:
an essential guide for IT and cloud professionals /
作者:
Nainar, Nagendra Kumar.
其他作者:
Panda, Ashish.
出版者:
Berkeley, CA :Apress : : 2023.,
面頁冊數:
xix, 271 p. :ill., digital ;24 cm.
內容註:
Ch1:Wireshark Primer -- Ch 2: Packet Capture and Analysis -- Ch 3: Capturing Secured Application for Analysis -- Ch 4: Wireless Packet Capture and Analysis -- Ch 5: Multimedia Capture and Analysis -- Ch 6:Cloud and Cloud-Native Traffic Capture -- Ch 7: Bluetooth Protocol Capture and Analysis -- Ch 8: Wireshark Analysis and Network Forensic. - Ch 9: Writing your own Dissector.
Contained By:
Springer Nature eBook
標題:
Computer networks - Security measures. -
電子資源:
https://doi.org/10.1007/978-1-4842-9001-9
ISBN:
9781484290019
Wireshark for network forensics = an essential guide for IT and cloud professionals /
Nainar, Nagendra Kumar.
Wireshark for network forensics
an essential guide for IT and cloud professionals /[electronic resource] :by Nagendra Kumar Nainar, Ashish Panda. - Berkeley, CA :Apress :2023. - xix, 271 p. :ill., digital ;24 cm.
Ch1:Wireshark Primer -- Ch 2: Packet Capture and Analysis -- Ch 3: Capturing Secured Application for Analysis -- Ch 4: Wireless Packet Capture and Analysis -- Ch 5: Multimedia Capture and Analysis -- Ch 6:Cloud and Cloud-Native Traffic Capture -- Ch 7: Bluetooth Protocol Capture and Analysis -- Ch 8: Wireshark Analysis and Network Forensic. - Ch 9: Writing your own Dissector.
With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. You will: Review Wireshark analysis and network forensics Study traffic capture and its analytics from mobile devices Analyze various access technology and cloud traffic Write your own dissector for any new or proprietary packet formats Capture secured application traffic for analysis.
ISBN: 9781484290019
Standard No.: 10.1007/978-1-4842-9001-9doiSubjects--Topical Terms:
579161
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .N35 2023
Dewey Class. No.: 005.8
Wireshark for network forensics = an essential guide for IT and cloud professionals /
LDR
:03134nmm a2200325 a 4500
001
2315240
003
DE-He213
005
20221230163305.0
006
m d
007
cr nn 008mamaa
008
230902s2023 cau s 0 eng d
020
$a
9781484290019
$q
(electronic bk.)
020
$a
9781484290002
$q
(paper)
024
7
$a
10.1007/978-1-4842-9001-9
$2
doi
035
$a
978-1-4842-9001-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
$b
.N35 2023
072
7
$a
U
$2
bicssc
072
7
$a
COM051390
$2
bisacsh
072
7
$a
ULJ
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.N157 2023
100
1
$a
Nainar, Nagendra Kumar.
$3
3627434
245
1 0
$a
Wireshark for network forensics
$h
[electronic resource] :
$b
an essential guide for IT and cloud professionals /
$c
by Nagendra Kumar Nainar, Ashish Panda.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2023.
300
$a
xix, 271 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Ch1:Wireshark Primer -- Ch 2: Packet Capture and Analysis -- Ch 3: Capturing Secured Application for Analysis -- Ch 4: Wireless Packet Capture and Analysis -- Ch 5: Multimedia Capture and Analysis -- Ch 6:Cloud and Cloud-Native Traffic Capture -- Ch 7: Bluetooth Protocol Capture and Analysis -- Ch 8: Wireshark Analysis and Network Forensic. - Ch 9: Writing your own Dissector.
520
$a
With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. You will: Review Wireshark analysis and network forensics Study traffic capture and its analytics from mobile devices Analyze various access technology and cloud traffic Write your own dissector for any new or proprietary packet formats Capture secured application traffic for analysis.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
1 4
$a
Open Source.
$3
2210577
650
2 4
$a
Computer Science.
$3
626642
700
1
$a
Panda, Ashish.
$3
3627435
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-9001-9
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9451490
電子資源
11.線上閱覽_V
電子書
EB TK5105.59 .N35 2023
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入