Wireshark fundamentals : a network engineer's handbook to analyzing network traffic (Record no. 33893)

000 -LEADER
fixed length control field a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250424b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781484280010
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.62
Item number JAI
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Jain, Vinit
245 ## - TITLE STATEMENT
Title Wireshark fundamentals : a network engineer's handbook to analyzing network traffic
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Apress,
Date of publication, distribution, etc 2022
Place of publication, distribution, etc Berkeley :
300 ## - PHYSICAL DESCRIPTION
Extent xv, 257 p. ;
Other physical details ill. (some col.),
Dimensions 24 cm.
365 ## - TRADE PRICE
Price amount 54.99
Price type code
Unit of pricing 97.70
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes index.
520 ## - SUMMARY, ETC.
Summary, etc Understand the fundamentals of the Wireshark tool that is key for network engineers and network security analysts. This book explains how the Wireshark tool can be used to analyze network traffic and teaches you network protocols and features. Author Vinit Jain walks you through the use of Wireshark to analyze network traffic by expanding each section of a header and examining its value. Performing packet capture and analyzing network traffic can be a complex, time-consuming, and tedious task. With the help of this book, you will use the Wireshark tool to its full potential. You will be able to build a strong foundation and know how Layer 2, 3, and 4 traffic behave, how various routing protocols and the Overlay Protocol function, and you will become familiar with their packet structure. Troubleshooting engineers will learn how to analyze traffic and identify issues in the network related to packet loss, bursty traffic, voice quality issues, etc. The book will help you understand the challenges faced in any network environment and how packet capture tools can be used to identify and isolate those issues. This hands-on guide teaches you how to perform various lab tasks. By the end of the book, you will have in-depth knowledge of the Wireshark tool and its features, including filtering and traffic analysis through graphs. You will know how to analyze traffic, find patterns of offending traffic, and secure your network. What You Will Learn Understand the architecture of Wireshark on different operating systems Analyze Layer 2 and 3 traffic frames Analyze routing protocol traffic Troubleshoot using Wireshark Graphs Who This Book Is For Network engineers, security specialists, technical support engineers, consultants, and cyber security engineers.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Packet Switching
Topical term or geographic name as entry element Data Transmission
Topical term or geographic name as entry element Computer Network Protocols
Topical term or geographic name as entry element Open Source
Topical term or geographic name as entry element Traffic frames
Topical term or geographic name as entry element Protocol traffic
Topical term or geographic name as entry element Troubleshoot
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Source of acquisition Cost, normal purchase price Full call number Barcode Date last seen Koha item type
          DAU DAU 2025-04-10 KBD 5372.52 004.62 JAI 035395 2025-04-24 Books

Powered by Koha