000 -LEADER |
fixed length control field |
a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250424b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781484280010 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004.62 |
Item number |
JAI |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Jain, Vinit |
245 ## - TITLE STATEMENT |
Title |
Wireshark fundamentals : a network engineer's handbook to analyzing network traffic |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
Apress, |
Date of publication, distribution, etc |
2022 |
Place of publication, distribution, etc |
Berkeley : |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xv, 257 p. ; |
Other physical details |
ill. (some col.), |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price amount |
54.99 |
Price type code |
€ |
Unit of pricing |
97.70 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Understand the fundamentals of the Wireshark tool that is key for network engineers and network security analysts. This book explains how the Wireshark tool can be used to analyze network traffic and teaches you network protocols and features. Author Vinit Jain walks you through the use of Wireshark to analyze network traffic by expanding each section of a header and examining its value. Performing packet capture and analyzing network traffic can be a complex, time-consuming, and tedious task. With the help of this book, you will use the Wireshark tool to its full potential. You will be able to build a strong foundation and know how Layer 2, 3, and 4 traffic behave, how various routing protocols and the Overlay Protocol function, and you will become familiar with their packet structure. Troubleshooting engineers will learn how to analyze traffic and identify issues in the network related to packet loss, bursty traffic, voice quality issues, etc. The book will help you understand the challenges faced in any network environment and how packet capture tools can be used to identify and isolate those issues. This hands-on guide teaches you how to perform various lab tasks. By the end of the book, you will have in-depth knowledge of the Wireshark tool and its features, including filtering and traffic analysis through graphs. You will know how to analyze traffic, find patterns of offending traffic, and secure your network. What You Will Learn Understand the architecture of Wireshark on different operating systems Analyze Layer 2 and 3 traffic frames Analyze routing protocol traffic Troubleshoot using Wireshark Graphs Who This Book Is For Network engineers, security specialists, technical support engineers, consultants, and cyber security engineers. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Packet Switching |
|
Topical term or geographic name as entry element |
Data Transmission |
|
Topical term or geographic name as entry element |
Computer Network Protocols |
|
Topical term or geographic name as entry element |
Open Source |
|
Topical term or geographic name as entry element |
Traffic frames |
|
Topical term or geographic name as entry element |
Protocol traffic |
|
Topical term or geographic name as entry element |
Troubleshoot |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |