Instituto Universitario de la Paz- UNIPAZ

Vista normal Vista MARC Vista ISBD

Wireshark for Network Forensics An Essential Guide for IT and Cloud Professionals

Por: Nagendra Kumar Nainar.
Tipo de material: materialTypeLabelLibroEditor: Bangalore, Karnataka, India Apress 2023Edición: 1a. Edición.Descripción: 271 p.ISBN: 978-1484290002.Clasificación CDD: 005.8
Contenidos:
Table of Contents About the authors About the contributor About the technical reviewer Acknowledgments Introduction Chapter 1: Wireshark Primer Chapter 2: Packet Capture and Analysis Chapter 3: Capturing Secured Application Traffic for Analysis Chapter 4: Capturing Wireless Traffic for Analysis Chapter 5: Multimedia Packet Capture and Analysis Chapter 6: Cloud and Cloud-Native Traffic Capture Chapter 7: Bluetooth Packet Capture and Analysis Chapter 8: Network Analysis and Forensics Chapter 9: Understanding and Implementing Wireshark Dissectors Index
Resumen: With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn waysto identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments.Nota de existencias: 2
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
    valoración media: 0.0 (0 votos)
Ubicación actual Biblioteca de origen Signatura Estado Fecha de vencimiento Código de barras Reserva de ejemplares
Biblioteca Unipaz

Centro de Investigaciones Santa Lucia

Biblioteca Unipaz

Centro de Investigaciones Santa Lucia

005.8 K96w (Navegar estantería) Disponible 9781484290002
Biblioteca Unipaz

Centro de Investigaciones Santa Lucia

Biblioteca Unipaz

Centro de Investigaciones Santa Lucia

005.8 K96w (Navegar estantería) Disponible 9781484290003
Reservas Totales: 0

Table of Contents

About the authors
About the contributor
About the technical reviewer
Acknowledgments
Introduction

Chapter 1: Wireshark Primer
Chapter 2: Packet Capture and Analysis
Chapter 3: Capturing Secured Application Traffic for Analysis
Chapter 4: Capturing Wireless Traffic for Analysis
Chapter 5: Multimedia Packet Capture and Analysis
Chapter 6: Cloud and Cloud-Native Traffic Capture
Chapter 7: Bluetooth Packet Capture and Analysis
Chapter 8: Network Analysis and Forensics
Chapter 9: Understanding and Implementing Wireshark Dissectors

Index

With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view.

You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn waysto identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same.

The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments.

No hay comentarios para este ítem.

Ingresar a su cuenta para colocar un comentario.

Haga clic en una imagen para verla en el visor de imágenes

Open Library:
Instituto Universitario de la Paz
Centro de Investigación Santa Lucia
Km 14 Via a Bucaramanga - Barrancabermeja - Santander