Grasp the basics of packet capture and analyze common protocols
Wireshark is a popular and powerful packet analysis tool that helps network administrators investigate latency issues and identify potential attacks.
Learn Wireshark provides a solid overview of basic protocol analysis and helps you to navigate the Wireshark interface, so you can confidently examine common protocols such as TCP, IP, and ICMP. The book starts by outlining the benefits of traffic analysis, takes you through the evolution of Wireshark, and then covers the phases of packet analysis. We ll review some of the command line tools and outline how to download and install Wireshark on either a PC or MAC. You'll gain a better understanding of what happens when you tap into the data stream, and learn how to personalize the Wireshark interface. This Wireshark book compares the display and capture filters and summarizes the OSI model and data encapsulation. You'll gain insights into the protocols that move data in the TCP/IP suite, and dissect the TCP handshake and teardown process. As you advance, you'll explore ways to troubleshoot network latency issues, and discover how to save and export files. Finally, you'll see how you can share captures with your colleagues using Cloudshark.
By the end of this book, you'll have a solid understanding of how to monitor and secure your network with the most updated version of Wireshark.
This book is for network administrators, security analysts, students, teachers, and anyone interested in learning about packet analysis using Wireshark. Basic knowledge of network fundamentals, devices, and protocols along with an understanding of different topologies will be beneficial.
"synopsis" may belong to another edition of this title.
Lisa Bock is an associate professor in the IT department at Pennsylvania College of Technology, in Williamsport, PA. Some of the courses she has taught since 2003 include networking, security, biometrics, protocol vulnerabilities using Wireshark, CCNA security, and unified communications. In addition to this, she is a LinkedIn learning instructor and has published over 30 courses, mainly in cybersecurity and networking. She holds an MS from UMUC along with numerous other certifications. She has had training in forensics, biometrics, networking, steganography, and network security. She is involved with various volunteer activities, has evaluated professional journals, and is an award-winning, nationally known speaker.
"About this title" may belong to another edition of this title.
£ 12.75 shipping from U.S.A. to United Kingdom
Destination, rates & speedsSeller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.86. Seller Inventory # G1789134501I4N00
Quantity: 1 available
Seller: Bookmans, Tucson, AZ, U.S.A.
paperback. Condition: Good. Satisfaction 100% guaranteed. Seller Inventory # mon0002623603
Quantity: 1 available
Seller: SecondSale, Montgomery, IL, U.S.A.
Condition: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00089545218
Quantity: 1 available
Seller: SecondSale, Montgomery, IL, U.S.A.
Condition: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00086336878
Quantity: 1 available
Seller: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_420333764
Quantity: 1 available