Packet analysis with Wireshark: leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK
Packt Publishing
2015
|
Schriftenreihe: | Community experience distilled
|
Schlagworte: | |
Beschreibung: | Description based on online resource; title from cover page (Safari, viewed December 23, 2015). - Includes index |
Beschreibung: | 1 online resource (1 volume) illustrations |
ISBN: | 9781785885846 1785885847 1785887815 9781785887819 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046098914 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190812s2015 |||| o||u| ||||||eng d | ||
020 | |a 9781785885846 |9 978-1-78588-584-6 | ||
020 | |a 1785885847 |9 1-78588-584-7 | ||
020 | |a 1785887815 |9 1-78588-781-5 | ||
020 | |a 9781785887819 |9 978-1-78588-781-9 | ||
035 | |a (ZDB-4-ITC)ocn933389359 | ||
035 | |a (OCoLC)933389359 | ||
035 | |a (DE-599)BVBBV046098914 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 004.6 |2 23 | |
100 | 1 | |a Nath, Anish |e Verfasser |4 aut | |
245 | 1 | 0 | |a Packet analysis with Wireshark |b leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis |c Anish Nath |
264 | 1 | |a Birmingham, UK |b Packt Publishing |c 2015 | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Community experience distilled | |
500 | |a Description based on online resource; title from cover page (Safari, viewed December 23, 2015). - Includes index | ||
650 | 7 | |a Computer networks |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Debugging in computer science |2 fast | |
650 | 7 | |a COMPUTERS / Computer Literacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Science |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Processing |2 bisacsh | |
650 | 7 | |a COMPUTERS / Hardware / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Machine Theory |2 bisacsh | |
650 | 7 | |a COMPUTERS / Reference |2 bisacsh | |
650 | 4 | |a Computer networks |a Debugging in computer science |a Computer networks |x Security measures | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |n Druck-Ausgabe |t Nath, Anish. Packet Analysis with Wireshark |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031479732 |
Datensatz im Suchindex
_version_ | 1804180404516683776 |
---|---|
any_adam_object | |
author | Nath, Anish |
author_facet | Nath, Anish |
author_role | aut |
author_sort | Nath, Anish |
author_variant | a n an |
building | Verbundindex |
bvnumber | BV046098914 |
collection | ZDB-4-ITC |
ctrlnum | (ZDB-4-ITC)ocn933389359 (OCoLC)933389359 (DE-599)BVBBV046098914 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02020nmm a2200481zc 4500</leader><controlfield tag="001">BV046098914</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190812s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785885846</subfield><subfield code="9">978-1-78588-584-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1785885847</subfield><subfield code="9">1-78588-584-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1785887815</subfield><subfield code="9">1-78588-781-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785887819</subfield><subfield code="9">978-1-78588-781-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn933389359</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)933389359</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046098914</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nath, Anish</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Packet analysis with Wireshark</subfield><subfield code="b">leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis</subfield><subfield code="c">Anish Nath</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from cover page (Safari, viewed December 23, 2015). - Includes index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Debugging in computer science</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Literacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Hardware / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Machine Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="a">Debugging in computer science</subfield><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Nath, Anish. Packet Analysis with Wireshark</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031479732</subfield></datafield></record></collection> |
id | DE-604.BV046098914 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:13Z |
institution | BVB |
isbn | 9781785885846 1785885847 1785887815 9781785887819 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031479732 |
oclc_num | 933389359 |
open_access_boolean | |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Packt Publishing |
record_format | marc |
series2 | Community experience distilled |
spelling | Nath, Anish Verfasser aut Packet analysis with Wireshark leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis Anish Nath Birmingham, UK Packt Publishing 2015 1 online resource (1 volume) illustrations txt rdacontent c rdamedia cr rdacarrier Community experience distilled Description based on online resource; title from cover page (Safari, viewed December 23, 2015). - Includes index Computer networks fast Computer networks / Security measures fast Debugging in computer science fast COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Computer networks Debugging in computer science Computer networks Security measures Erscheint auch als Druck-Ausgabe Druck-Ausgabe Nath, Anish. Packet Analysis with Wireshark |
spellingShingle | Nath, Anish Packet analysis with Wireshark leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis Computer networks fast Computer networks / Security measures fast Debugging in computer science fast COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Computer networks Debugging in computer science Computer networks Security measures |
title | Packet analysis with Wireshark leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis |
title_auth | Packet analysis with Wireshark leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis |
title_exact_search | Packet analysis with Wireshark leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis |
title_full | Packet analysis with Wireshark leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis Anish Nath |
title_fullStr | Packet analysis with Wireshark leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis Anish Nath |
title_full_unstemmed | Packet analysis with Wireshark leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis Anish Nath |
title_short | Packet analysis with Wireshark |
title_sort | packet analysis with wireshark leverage the power of wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis |
title_sub | leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis |
topic | Computer networks fast Computer networks / Security measures fast Debugging in computer science fast COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Computer networks Debugging in computer science Computer networks Security measures |
topic_facet | Computer networks Computer networks / Security measures Debugging in computer science COMPUTERS / Computer Literacy COMPUTERS / Computer Science COMPUTERS / Data Processing COMPUTERS / Hardware / General COMPUTERS / Information Technology COMPUTERS / Machine Theory COMPUTERS / Reference Computer networks Debugging in computer science Computer networks Security measures |
work_keys_str_mv | AT nathanish packetanalysiswithwiresharkleveragethepowerofwiresharktotroubleshootyournetworkingissuesbyusingeffectivepacketanalysistechniquesandperforminganimprovedprotocolanalysis |