Mastering Wireshark 2 :: develop skills for network analysis and address a wide range of information security threats /
Annotation
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2018.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Annotation |
Beschreibung: | 1 online resource (1 volume) : illustrations |
ISBN: | 9781788621366 1788621360 1788626524 9781788626521 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1042168476 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 180628s2018 enka o 000 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d OCLCF |d TOH |d STF |d DEBBG |d TEFOD |d CEF |d G3B |d TEFOD |d S9I |d N$T |d UAB |d VT2 |d C6I |d OCLCQ |d OCLCO |d NZAUC |d OCLCQ |d OCLCO | ||
020 | |a 9781788621366 |q (electronic bk.) | ||
020 | |a 1788621360 |q (electronic bk.) | ||
020 | |a 1788626524 | ||
020 | |a 9781788626521 | ||
035 | |a (OCoLC)1042168476 | ||
037 | |a CL0500000975 |b Safari Books Online | ||
037 | |a E919239E-932F-41D0-899B-A7A6F3A03E53 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a TK5105.55 | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
082 | 7 | |a 004.66 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Crouthamel, Andrew, |e author. | |
245 | 1 | 0 | |a Mastering Wireshark 2 : |b develop skills for network analysis and address a wide range of information security threats / |c Andrew Crouthamel. |
246 | 3 | |a Mastering Wireshark two | |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2018. | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
588 | 0 | |a Online resource; title from title page (Safari, viewed June 27, 2018). | |
520 | 8 | |a Annotation |b Use Wireshark 2 to overcome real-world network problemsKey FeaturesDelve into the core functionalities of the latest version of WiresharkMaster network security skills with Wireshark 2Efficiently find the root cause of network-related issuesBook DescriptionWireshark, a combination of a Linux distro (Kali) and an open source security framework (Metasploit), is a popular and powerful tool. Wireshark is mainly used to analyze the bits and bytes that flow through a network. It efficiently deals with the second to the seventh layer of network protocols, and the analysis made is presented in a form that can be easily read by people. Mastering Wireshark 2 helps you gain expertise in securing your network. We start with installing and setting up Wireshark2.0, and then explore its interface in order to understand all of its functionalities. As you progress through the chapters, you will discover different ways to create, use, capture, and display filters. By halfway through the book, you will have mastered Wireshark features, analyzed different layers of the network protocol, and searched for anomalies. You'll learn about plugins and APIs in depth. Finally, the book focuses on pocket analysis for security tasks, command-line utilities, and tools that manage trace files. By the end of the book, you'll have learned how to use Wireshark for network security analysis and configured it for troubleshooting purposes. What you will learn Understand what network and protocol analysis is and how it can help you Use Wireshark to capture packets in your network Filter captured traffic to only show what you need Explore useful statistic displays to make it easier to diagnose issues Customize Wireshark to your own specifications Analyze common network and network application protocolsWho this book is forIf you are a security professional or a network enthusiast and are interested in understanding the internal working of networks, and if you have some prior knowledge of using Wireshark, then this book is for you. | |
650 | 0 | |a Computer network protocols. |0 http://id.loc.gov/authorities/subjects/sh85029512 | |
650 | 0 | |a Packet switching (Data transmission) |0 http://id.loc.gov/authorities/subjects/sh85096523 | |
650 | 0 | |a Computer networks |x Monitoring. |0 http://id.loc.gov/authorities/subjects/sh2006002867 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Packet transport networks. |0 http://id.loc.gov/authorities/subjects/sh2010015491 | |
650 | 6 | |a Protocoles de réseaux d'ordinateurs. | |
650 | 6 | |a Commutation de paquets. | |
650 | 6 | |a Réseaux d'ordinateurs |x Surveillance. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a Computer network protocols |2 fast | |
650 | 7 | |a Computer networks |x Monitoring |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Packet switching (Data transmission) |2 fast | |
650 | 7 | |a Packet transport networks |2 fast | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1823667 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 1823667 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1042168476 |
---|---|
_version_ | 1816882464090488832 |
adam_text | |
any_adam_object | |
author | Crouthamel, Andrew |
author_facet | Crouthamel, Andrew |
author_role | aut |
author_sort | Crouthamel, Andrew |
author_variant | a c ac |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.55 |
callnumber-search | TK5105.55 |
callnumber-sort | TK 45105.55 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)1042168476 |
dewey-full | 004.66 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.66 |
dewey-search | 004.66 |
dewey-sort | 14.66 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05194cam a2200733 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1042168476</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">180628s2018 enka o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">OCLCF</subfield><subfield code="d">TOH</subfield><subfield code="d">STF</subfield><subfield code="d">DEBBG</subfield><subfield code="d">TEFOD</subfield><subfield code="d">CEF</subfield><subfield code="d">G3B</subfield><subfield code="d">TEFOD</subfield><subfield code="d">S9I</subfield><subfield code="d">N$T</subfield><subfield code="d">UAB</subfield><subfield code="d">VT2</subfield><subfield code="d">C6I</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">NZAUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788621366</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788621360</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788626524</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788626521</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1042168476</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000975</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">E919239E-932F-41D0-899B-A7A6F3A03E53</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.55</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.66</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Crouthamel, Andrew,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mastering Wireshark 2 :</subfield><subfield code="b">develop skills for network analysis and address a wide range of information security threats /</subfield><subfield code="c">Andrew Crouthamel.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">Mastering Wireshark two</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2018.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from title page (Safari, viewed June 27, 2018).</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Annotation</subfield><subfield code="b">Use Wireshark 2 to overcome real-world network problemsKey FeaturesDelve into the core functionalities of the latest version of WiresharkMaster network security skills with Wireshark 2Efficiently find the root cause of network-related issuesBook DescriptionWireshark, a combination of a Linux distro (Kali) and an open source security framework (Metasploit), is a popular and powerful tool. Wireshark is mainly used to analyze the bits and bytes that flow through a network. It efficiently deals with the second to the seventh layer of network protocols, and the analysis made is presented in a form that can be easily read by people. Mastering Wireshark 2 helps you gain expertise in securing your network. We start with installing and setting up Wireshark2.0, and then explore its interface in order to understand all of its functionalities. As you progress through the chapters, you will discover different ways to create, use, capture, and display filters. By halfway through the book, you will have mastered Wireshark features, analyzed different layers of the network protocol, and searched for anomalies. You'll learn about plugins and APIs in depth. Finally, the book focuses on pocket analysis for security tasks, command-line utilities, and tools that manage trace files. By the end of the book, you'll have learned how to use Wireshark for network security analysis and configured it for troubleshooting purposes. What you will learn Understand what network and protocol analysis is and how it can help you Use Wireshark to capture packets in your network Filter captured traffic to only show what you need Explore useful statistic displays to make it easier to diagnose issues Customize Wireshark to your own specifications Analyze common network and network application protocolsWho this book is forIf you are a security professional or a network enthusiast and are interested in understanding the internal working of networks, and if you have some prior knowledge of using Wireshark, then this book is for you.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer network protocols.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029512</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Packet switching (Data transmission)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85096523</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Monitoring.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2006002867</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Packet transport networks.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2010015491</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protocoles de réseaux d'ordinateurs.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Commutation de paquets.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Surveillance.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Literacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Data Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Machine Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer network protocols</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Monitoring</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Packet switching (Data transmission)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Packet transport networks</subfield><subfield code="2">fast</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1823667</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1823667</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1042168476 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:29:01Z |
institution | BVB |
isbn | 9781788621366 1788621360 1788626524 9781788626521 |
language | English |
oclc_num | 1042168476 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Crouthamel, Andrew, author. Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threats / Andrew Crouthamel. Mastering Wireshark two Birmingham, UK : Packt Publishing, 2018. 1 online resource (1 volume) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Online resource; title from title page (Safari, viewed June 27, 2018). Annotation Use Wireshark 2 to overcome real-world network problemsKey FeaturesDelve into the core functionalities of the latest version of WiresharkMaster network security skills with Wireshark 2Efficiently find the root cause of network-related issuesBook DescriptionWireshark, a combination of a Linux distro (Kali) and an open source security framework (Metasploit), is a popular and powerful tool. Wireshark is mainly used to analyze the bits and bytes that flow through a network. It efficiently deals with the second to the seventh layer of network protocols, and the analysis made is presented in a form that can be easily read by people. Mastering Wireshark 2 helps you gain expertise in securing your network. We start with installing and setting up Wireshark2.0, and then explore its interface in order to understand all of its functionalities. As you progress through the chapters, you will discover different ways to create, use, capture, and display filters. By halfway through the book, you will have mastered Wireshark features, analyzed different layers of the network protocol, and searched for anomalies. You'll learn about plugins and APIs in depth. Finally, the book focuses on pocket analysis for security tasks, command-line utilities, and tools that manage trace files. By the end of the book, you'll have learned how to use Wireshark for network security analysis and configured it for troubleshooting purposes. What you will learn Understand what network and protocol analysis is and how it can help you Use Wireshark to capture packets in your network Filter captured traffic to only show what you need Explore useful statistic displays to make it easier to diagnose issues Customize Wireshark to your own specifications Analyze common network and network application protocolsWho this book is forIf you are a security professional or a network enthusiast and are interested in understanding the internal working of networks, and if you have some prior knowledge of using Wireshark, then this book is for you. Computer network protocols. http://id.loc.gov/authorities/subjects/sh85029512 Packet switching (Data transmission) http://id.loc.gov/authorities/subjects/sh85096523 Computer networks Monitoring. http://id.loc.gov/authorities/subjects/sh2006002867 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Packet transport networks. http://id.loc.gov/authorities/subjects/sh2010015491 Protocoles de réseaux d'ordinateurs. Commutation de paquets. Réseaux d'ordinateurs Surveillance. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Computer network protocols fast Computer networks Monitoring fast Computer networks Security measures fast Packet switching (Data transmission) fast Packet transport networks fast FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1823667 Volltext |
spellingShingle | Crouthamel, Andrew Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threats / Computer network protocols. http://id.loc.gov/authorities/subjects/sh85029512 Packet switching (Data transmission) http://id.loc.gov/authorities/subjects/sh85096523 Computer networks Monitoring. http://id.loc.gov/authorities/subjects/sh2006002867 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Packet transport networks. http://id.loc.gov/authorities/subjects/sh2010015491 Protocoles de réseaux d'ordinateurs. Commutation de paquets. Réseaux d'ordinateurs Surveillance. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Computer network protocols fast Computer networks Monitoring fast Computer networks Security measures fast Packet switching (Data transmission) fast Packet transport networks fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85029512 http://id.loc.gov/authorities/subjects/sh85096523 http://id.loc.gov/authorities/subjects/sh2006002867 http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh2010015491 |
title | Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threats / |
title_alt | Mastering Wireshark two |
title_auth | Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threats / |
title_exact_search | Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threats / |
title_full | Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threats / Andrew Crouthamel. |
title_fullStr | Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threats / Andrew Crouthamel. |
title_full_unstemmed | Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threats / Andrew Crouthamel. |
title_short | Mastering Wireshark 2 : |
title_sort | mastering wireshark 2 develop skills for network analysis and address a wide range of information security threats |
title_sub | develop skills for network analysis and address a wide range of information security threats / |
topic | Computer network protocols. http://id.loc.gov/authorities/subjects/sh85029512 Packet switching (Data transmission) http://id.loc.gov/authorities/subjects/sh85096523 Computer networks Monitoring. http://id.loc.gov/authorities/subjects/sh2006002867 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Packet transport networks. http://id.loc.gov/authorities/subjects/sh2010015491 Protocoles de réseaux d'ordinateurs. Commutation de paquets. Réseaux d'ordinateurs Surveillance. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Computer network protocols fast Computer networks Monitoring fast Computer networks Security measures fast Packet switching (Data transmission) fast Packet transport networks fast |
topic_facet | Computer network protocols. Packet switching (Data transmission) Computer networks Monitoring. Computer networks Security measures. Packet transport networks. Protocoles de réseaux d'ordinateurs. Commutation de paquets. Réseaux d'ordinateurs Surveillance. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Computer Literacy. COMPUTERS Computer Science. COMPUTERS Data Processing. COMPUTERS Hardware General. COMPUTERS Information Technology. COMPUTERS Machine Theory. COMPUTERS Reference. Computer network protocols Computer networks Monitoring Computer networks Security measures Packet transport networks |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1823667 |
work_keys_str_mv | AT crouthamelandrew masteringwireshark2developskillsfornetworkanalysisandaddressawiderangeofinformationsecuritythreats AT crouthamelandrew masteringwiresharktwo |