![]() |
![]() |
Your cart is empty |
||
Showing 1 - 2 of 2 matches in All Departments
Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2 Key Features Place Wireshark 2 in your network and configure it for effective network analysis Deep dive into the enhanced functionalities of Wireshark 2 and protect your network with ease A practical guide with exciting recipes on a widely used network protocol analyzer Book DescriptionThis book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. The book expands on some of the subjects explored in the first version, including TCP performance, network security, Wireless LAN, and how to use Wireshark for cloud and virtual system monitoring. You will learn how to analyze end-to-end IPv4 and IPv6 connectivity failures for Unicast and Multicast traffic using Wireshark. It also includes Wireshark capture files so that you can practice what you've learned in the book. You will understand the normal operation of E-mail protocols and learn how to use Wireshark for basic analysis and troubleshooting. Using Wireshark, you will be able to resolve and troubleshoot common applications that are used in an enterprise network, like NetBIOS and SMB protocols. Finally, you will also be able to measure network parameters, check for network problems caused by them, and solve them effectively. By the end of this book, you'll know how to analyze traffic, find patterns of various offending traffic, and secure your network from them. What you will learn Configure Wireshark 2 for effective network analysis and troubleshooting Set up various display and capture filters Understand networking layers, including IPv4 and IPv6 analysis Explore performance issues in TCP/IP Get to know about Wi-Fi testing and how to resolve problems related to wireless LANs Get information about network phenomena, events, and errors Locate faults in detecting security failures and breaches in networks Who this book is forThis book is for security professionals, network administrators, R&D, engineering and technical support, and communications managers who are using Wireshark for network analysis and troubleshooting. It requires a basic understanding of networking concepts, but does not require specific and detailed technical knowledge of protocols or vendor implementations.
A comprehensive guide to learning container and application hosting capabilities in Cisco platforms, and implementing them to achieve higher efficiency in network deployments and operations Cisco architectures offer comprehensive compute virtualization capabilities to accommodate both native and third-party container hosting, so you can containerize and instantiate any application or network service and gain unprecedented value from your networks. Direct from Cisco, this is the complete guide to deploying and operating containerized application and network services on Cisco platforms. First, the authors review essential virtualization and containerization concepts for all network professionals and introduce leading orchestration tools. Next, they take a deep dive into container networking, introducing Cisco architectural support for container infrastructures. You'll find modular coverage of configuration, activation,orchestration, operations, and application hosting for each key Cisco software platform: IOS-XE, IOS-XR, and NX-OS. The authors explore diverse orchestration tools, including LXC,Docker, and Kubernetes, and cover both Cisco and open-source tools for building and testing applications. They conclude with multiple use cases that show how containerization can improve agility and efficiency in a wide range of network environments. Review the motivation, drivers, and concepts of computing virtualization Learn how Cisco platforms are achieving infrastructure virtualization Explore the Cisco reference model for developing cloud-native services and moving to cloud-native network functions Master Cisco container networking fundamentals, supported modes, and configuration Enable,install, activate, and orchestrate containerized applications in Cisco IOS-XE,IOS-XR, and NX-OS Compare tools and methods for developing, testing, hosting, and orchestrating containerized applications Discover real-world use cases for Day-0, Day-1, and Day-2 operations, with practical deployment examples Preview merging trends in network containerization
|
![]() ![]() You may like...
Piano Adventures for the Older Beginner…
Nancy Faber, Randall Faber
Paperback
R327
Discovery Miles 3 270
Alfred's Basic Adult Piano Course…
Willard A Palmer, Morton Manus, …
Book
Alfred's Basic All-In-One Course, Bk 4…
Willard A Palmer, Morton Manus, …
Staple bound
Alfred's Basic Piano Library Prep Course…
Willard A Palmer, Morton Manus, …
Paperback
Elementary Method for the Piano, Op. 101
Ferdinand Beyer, Gayle Kowalchyk, …
Book
|