Instituto Universitario de la Paz- UNIPAZ

Wireshark for Network Forensics (Registro nro. 6841)

000 -LEADER
fixed length control field 02440nam a22001697a 4500
INTERNATIONAL STANDARD BOOK NUMBER
ISBN 978-1484290002
NÚMERO DE CLASIFICACION DECIMAL DEWEY
Numero de Clasificacion 005.8
Numero de Item K96w
ENTRADA PRINCIPAL--NOMBRE DE AUTOR
Autor Nagendra Kumar Nainar
TITULO
Titulo Wireshark for Network Forensics
Subtitulo del Libro An Essential Guide for IT and Cloud Professionals
NUMERO DE EDICION
Número de Edicion 1a. Edición
PUBLICACION, DISTRIBUCION, ETC. (IMPRESION)
Lugar de Publicacion Bangalore, Karnataka, India
Nombre de la Editorial Apress
Año de Publicación 2023
DESCRIPCION FISICA
Número de Paginas 271 p.
FORMATO DE NOTAS DE CONTENIDO
Formato de Notas de Contenido Table of Contents

About the authors
About the contributor
About the technical reviewer
Acknowledgments
Introduction

Chapter 1: Wireshark Primer
Chapter 2: Packet Capture and Analysis
Chapter 3: Capturing Secured Application Traffic for Analysis
Chapter 4: Capturing Wireless Traffic for Analysis
Chapter 5: Multimedia Packet Capture and Analysis
Chapter 6: Cloud and Cloud-Native Traffic Capture
Chapter 7: Bluetooth Packet Capture and Analysis
Chapter 8: Network Analysis and Forensics
Chapter 9: Understanding and Implementing Wireshark Dissectors

Index
RESUMEN, ETC.
Resumen, etc With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view.

You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn waysto identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same.

The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments.
TEXTUAL HOLDINGS--UNIDAD BIBLIOGRAFICA BASICA
Existencias 2
ADDED ENTRY ELEMENTS (KOHA)
Koha item type Libros
Existencias
Withdrawn status Lost status Permanent Location Current Location Date acquired Source of acquisition Full call number Accession Number Koha item type
    Biblioteca Unipaz Biblioteca Unipaz 2024-07-31 Compras 005.8 K96w 9781484290002 Libros
    Biblioteca Unipaz Biblioteca Unipaz 2024-07-31 Compras 005.8 K96w 9781484290003 Libros
Instituto Universitario de la Paz
Centro de Investigación Santa Lucia
Km 14 Via a Bucaramanga - Barrancabermeja - Santander