• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950560]
• Literatura piękna
 [1849509]

  więcej...
• Turystyka
 [71097]
• Informatyka
 [151150]
• Komiksy
 [35848]
• Encyklopedie
 [23178]
• Dziecięca
 [617388]
• Hobby
 [139064]
• AudioBooki
 [1657]
• Literatura faktu
 [228597]
• Muzyka CD
 [383]
• Słowniki
 [2855]
• Inne
 [445295]
• Kalendarze
 [1464]
• Podręczniki
 [167547]
• Poradniki
 [480102]
• Religia
 [510749]
• Czasopisma
 [516]
• Sport
 [61293]
• Sztuka
 [243352]
• CD, DVD, Video
 [3414]
• Technologie
 [219456]
• Zdrowie
 [101002]
• Książkowe Klimaty
 [124]
• Zabawki
 [2311]
• Puzzle, gry
 [3459]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8079]
Kategorie szczegółowe BISAC

Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals

ISBN-13: 9781484290002 / Angielski / Miękka / 2022 / 271 str.

Nagendra Kumar Nainar; Ashish Panda
Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals Nagendra Kumar Nainar Ashish Panda 9781484290002 Apress - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals

ISBN-13: 9781484290002 / Angielski / Miękka / 2022 / 271 str.

Nagendra Kumar Nainar; Ashish Panda
cena 228,02
(netto: 217,16 VAT:  5%)

Najniższa cena z 30 dni: 227,39
Termin realizacji zamówienia:
ok. 16-18 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!

With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view.You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same.The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic.Wireshark for Network Forensicsprovides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments.What You'll LearnReview Wireshark analysis and network forensicsStudy traffic capture and its analytics from mobile devicesAnalyze various access technology and cloud trafficWrite your own dissector for any new or proprietary packet formatsCapture secured application traffic for analysisWho This Book Is ForIT Professionals, Cloud Architects, Infrastructure Administrators, and Network/Cloud Operators

With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view.   You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same.  The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. What You'll Learn

  • Review Wireshark analysis and network forensics
  • Study traffic capture and its analytics from mobile devices
  • Analyze various access technology and cloud traffic
  • Write your own dissector for any new or proprietary packet formats
  • Capture secured application traffic for analysis
Who This Book Is ForIT Professionals, Cloud Architects, Infrastructure Administrators, and Network/Cloud Operators

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Programming - Open Source
Computers > Computer Science
Wydawca:
Apress
Język:
Angielski
ISBN-13:
9781484290002
Rok wydania:
2022
Dostępne języki:
Ilość stron:
271
Waga:
0.50 kg
Wymiary:
25.4 x 17.78 x 1.55
Oprawa:
Miękka
Dodatkowe informacje:
Wydanie ilustrowane

Chapter 1: Wireshark Primer

·         Introduction to Wireshark Architecture

·         Wireshark Package installation and Usage

·         Wireshark Cloud Services

·         Version and feature parity

·         Basic Analysis and filtering

·         Data stream and Graphs

·         Summary

 

 Chapter 2: Packet Capture and Analysis

§  Native Tool based Traffic Capture

§  Wireshark tool based Traffic Capture

§  Wireless Capture Modes and Configurations

·         High volume packet analysis (size based, capture filters)

·         Wireshark command line tool

·         Mobile devices Traffic Capture

                                                             

 Chapter 3: Capturing Secured Application for Analysis

·         Introduction to Secured Applications

·         Secure DNS

·         HTTPS

·         mTLS

·         IPsec, ISAKMP, Kerberos

·         SNMPv3

·         WEP, and WPA/WPA2/WPA3

 

 

Chapter4: Wireless Packet Capture and Analysis

·         Basics of Wireless Technology

·         Wireless packet types (data, control, auth)

·         Wireless operational aspects and effect on wireshark capture

·         Effect of Wireshark modes (monitor, promiscuous) on wireless capture 

·         Setting up Wireshark 802.11 captures for various OS types

·         Decoding beacons/WEP/WPA/WPA2

·         Wireless packet analysis

 

Chapter 5: Multimedia Capture and Analysis

·         Introduction to Multimedia Applications

·         Export Objects (file, images applications) from data stream

·         video content extraction and replay (RTP / RTSP)

·         mpeg live streams capture and replay

·         VoIP call analysis and replay

 

 

 

Chapter 6: Cloud and Cloud-Native Traffic Capture

·         Introduction and Cloud and Cloud Native Applications

·         Native and Wireshark Captures in AWS

·         Native and Wireshark Captures in GCP

·         Native and Wireshark Captures in Azure

·         LXC and Namespace based capture

·         Kubernetes POD capture

 

Chapter 7: Bluetooth Protocol Capture and Analysis

·         Introduction to Bluetooth and Usecase

·         HCIDump captures

·         Bluetooth protocol analysis

 

Chapter 8: Wireshark Analysis and Network Forensic

·         Networking protocol operation analysis

·         Analyzing network throughput issues, performance degradations

·         Network security attack identification , post mortems, prevention

·         Discovering malwares, covert communications

·         Packet replays

Chapter 9: Writing your own dissector

 

·         Wireshark Dissectors

·         Use Case Example

·         Dissector Example

 

 

Nagendra Kumar Nainar (CCIE#20987) is a Principal Engineer with Cisco Customer Experience(CX) Organization (Formerly TAC), focusing on Enterprise customers. He is the co-inventor of more than 130 patent applications in different technologies including Virtualization/Container technologies. He is the co-author of multiple Internet RFCs, various Internet drafts and IEEE papers. Nagendra also co-authored multiple technical books with leading publishers such as Cisco Press and Packt Publication. He is a guest lecturer in North Carolina State University and a speaker in different network forums.


Ashish Panda (CCIE#33270) is a Senior Technical Leader with Cisco Systems Customer Experience CX Organization primarily focused on handling complex service provider network design and troubleshooting escalations. He has 19+ years of rich experience in network design, operation, and troubleshooting with various large enterprises and service provider networks (ISP, satellite, MPLS, 5G, and cloud) worldwide. He is a speaker at various Cisco internal and external events and is very active in the network industry standard bodies.

With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view.   

You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. 

The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. 

You will:

  • Review Wireshark analysis and network forensics
  • Study traffic capture and its analytics from mobile devices
  • Analyze various access technology and cloud traffic
  • Write your own dissector for any new or proprietary packet formats
  • Capture secured application traffic for analysis




Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia