Wireshark for network forensics : an essential guide for IT and cloud professionals (Record no. 32568)

000 -LEADER
fixed length control field nam a22 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230902b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781484290002
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number NAI
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Nainar, Nagendra Kumar
245 ## - TITLE STATEMENT
Title Wireshark for network forensics : an essential guide for IT and cloud professionals
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Apress,
Date of publication, distribution, etc 2023
Place of publication, distribution, etc New york :
300 ## - PHYSICAL DESCRIPTION
Extent xix, 271 p. ;
Other physical details ill., (b & w),
Dimensions 25 cm
365 ## - TRADE PRICE
Price amount 49.99
Price type code EUR
Unit of pricing 94.90
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element GCP environments
Topical term or geographic name as entry element Kubernetes
Topical term or geographic name as entry element Multimedia traffic
Topical term or geographic name as entry element Traffic analysis
Topical term or geographic name as entry element Swiss army knife
Topical term or geographic name as entry element Wireshark tool
Topical term or geographic name as entry element Malware
Topical term or geographic name as entry element Network attacks
Topical term or geographic name as entry element SecureDNS
Topical term or geographic name as entry element Filter-based analysis
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Panda, Ashish
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Cost, normal purchase price Full call number Barcode Date last seen Koha item type
          DAIICT DAIICT 2023-08-28 4744.05 005.8 NAI 034204 2023-09-02 Books

Powered by Koha