Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Wireshark for Network Forensics - An Essential Guide for IT and Cloud Professionals (Paperback, 1st ed.)
Loot Price: R1,172
Discovery Miles 11 720
You Save: R247
(17%)
|
|
Wireshark for Network Forensics - An Essential Guide for IT and Cloud Professionals (Paperback, 1st ed.)
Expected to ship within 10 - 15 working days
|
With the advent of emerging and complex technologies, traffic
capture and analysis play an integral part in the overall IT
operation. This book outlines the rich set of advanced features and
capabilities of the Wireshark tool, considered by many to be the
de-facto Swiss army knife for IT operational activities involving
traffic analysis. This open-source tool is available as CLI or GUI.
It is designed to capture using different modes, and to leverage
the community developed and integrated features, such as
filter-based analysis or traffic flow graph view. You'll start by
reviewing the basics of Wireshark, and then examine the details of
capturing and analyzing secured application traffic such as
SecureDNS, HTTPS, and IPSec. You'll then look closely at the
control plane and data plane capture, and study the analysis of
wireless technology traffic such as 802.11, which is the common
access technology currently used, along with Bluetooth. You'll also
learn ways to identify network attacks, malware, covert
communications, perform security incident post mortems, and ways to
prevent the same. The book further explains the capture and
analysis of secure multimedia traffic, which constitutes around 70%
of all overall internet traffic. Wireshark for Network Forensics
provides a unique look at cloud and cloud-native architecture-based
traffic capture in Kubernetes, Docker-based, AWS, and GCP
environments. What You'll Learn Review Wireshark analysis and
network forensics Study traffic capture and its analytics from
mobile devices Analyze various access technology and cloud traffic
Write your own dissector for any new or proprietary packet formats
Capture secured application traffic for analysis Who This Book Is
For IT Professionals, Cloud Architects, Infrastructure
Administrators, and Network/Cloud Operators
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|