|
Showing 1 - 2 of
2 matches in All Departments
With the advent of emerging and complex technologies, traffic
capture and analysis play an integral part in the overall IT
operation. This book outlines the rich set of advanced features and
capabilities of the Wireshark tool, considered by many to be the
de-facto Swiss army knife for IT operational activities involving
traffic analysis. This open-source tool is available as CLI or GUI.
It is designed to capture using different modes, and to leverage
the community developed and integrated features, such as
filter-based analysis or traffic flow graph view. You'll start by
reviewing the basics of Wireshark, and then examine the details of
capturing and analyzing secured application traffic such as
SecureDNS, HTTPS, and IPSec. You'll then look closely at the
control plane and data plane capture, and study the analysis of
wireless technology traffic such as 802.11, which is the common
access technology currently used, along with Bluetooth. You'll also
learn ways to identify network attacks, malware, covert
communications, perform security incident post mortems, and ways to
prevent the same. The book further explains the capture and
analysis of secure multimedia traffic, which constitutes around 70%
of all overall internet traffic. Wireshark for Network Forensics
provides a unique look at cloud and cloud-native architecture-based
traffic capture in Kubernetes, Docker-based, AWS, and GCP
environments. What You'll Learn Review Wireshark analysis and
network forensics Study traffic capture and its analytics from
mobile devices Analyze various access technology and cloud traffic
Write your own dissector for any new or proprietary packet formats
Capture secured application traffic for analysis Who This Book Is
For IT Professionals, Cloud Architects, Infrastructure
Administrators, and Network/Cloud Operators
A comprehensive guide to learning container and application hosting
capabilities in Cisco platforms, and implementing them to achieve
higher efficiency in network deployments and operations Cisco
architectures offer comprehensive compute virtualization
capabilities to accommodate both native and third-party container
hosting, so you can containerize and instantiate any application or
network service and gain unprecedented value from your networks.
Direct from Cisco, this is the complete guide to deploying and
operating containerized application and network services on Cisco
platforms. First, the authors review essential virtualization and
containerization concepts for all network professionals and
introduce leading orchestration tools. Next, they take a deep dive
into container networking, introducing Cisco architectural support
for container infrastructures. You'll find modular coverage of
configuration, activation,orchestration, operations, and
application hosting for each key Cisco software platform: IOS-XE,
IOS-XR, and NX-OS. The authors explore diverse orchestration tools,
including LXC,Docker, and Kubernetes, and cover both Cisco and
open-source tools for building and testing applications. They
conclude with multiple use cases that show how containerization can
improve agility and efficiency in a wide range of network
environments. Review the motivation, drivers, and concepts of
computing virtualization Learn how Cisco platforms are achieving
infrastructure virtualization Explore the Cisco reference model for
developing cloud-native services and moving to cloud-native network
functions Master Cisco container networking fundamentals, supported
modes, and configuration Enable,install, activate, and orchestrate
containerized applications in Cisco IOS-XE,IOS-XR, and NX-OS
Compare tools and methods for developing, testing, hosting, and
orchestrating containerized applications Discover real-world use
cases for Day-0, Day-1, and Day-2 operations, with practical
deployment examples Preview merging trends in network
containerization
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R369
Discovery Miles 3 690
Loot
Nadine Gordimer
Paperback
(2)
R398
R369
Discovery Miles 3 690
|