Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham, UK
Packt Publishing
2015
|
Schriftenreihe: | Community experience distilled
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781784393335/?ar |
Zusammenfassung: | If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed. |
Beschreibung: | Includes index. - Online resource; title from cover (Safari, viewed August 26, 2015) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 1784399515 9781784399511 9781784393335 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047690283 | ||
003 | DE-627-1 | ||
005 | 20240228115928.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2015 xx |||||o 00| ||eng c | ||
020 | |a 1784399515 |9 1-78439-951-5 | ||
020 | |a 9781784399511 |c electronic bk. |9 978-1-78439-951-1 | ||
020 | |a 9781784393335 |9 978-1-78439-333-5 | ||
035 | |a (DE-627-1)047690283 | ||
035 | |a (DE-599)KEP047690283 | ||
035 | |a (ORHE)9781784393335 | ||
035 | |a (DE-627-1)047690283 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 004.66 | |
100 | 1 | |a Verma, Piyush |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Wireshark network security |b a succinct guide to securely administer your network using Wireshark |c Piyush Verma |
246 | 3 | 3 | |a Succinct guide to securely administer your network using Wireshark |
264 | 1 | |a Birmingham, UK |b Packt Publishing |c 2015 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Community experience distilled | |
500 | |a Includes index. - Online resource; title from cover (Safari, viewed August 26, 2015) | ||
520 | |a If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed. | ||
650 | 0 | |a Computer networks |x Quality control | |
650 | 0 | |a Network performance (Telecommunication) | |
650 | 0 | |a Computer networks |x Security measures |x Computer programs | |
650 | 4 | |a Réseaux d'ordinateurs ; Qualité ; Contrôle | |
650 | 4 | |a Performance des réseaux (Télécommunications) | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels | |
650 | 4 | |a COMPUTERS ; Networking ; Network Protocols | |
650 | 4 | |a COMPUTERS ; Security ; Viruses & Malware | |
650 | 4 | |a Computer networks ; Quality control | |
650 | 4 | |a Computer networks ; Security measures ; Computer programs | |
650 | 4 | |a Network performance (Telecommunication) | |
776 | 1 | |z 9781784393335 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781784393335 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781784393335/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047690283 |
---|---|
_version_ | 1835903178434936832 |
adam_text | |
any_adam_object | |
author | Verma, Piyush |
author_facet | Verma, Piyush |
author_role | aut |
author_sort | Verma, Piyush |
author_variant | p v pv |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047690283 (DE-599)KEP047690283 (ORHE)9781784393335 |
dewey-full | 004.66 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.66 |
dewey-search | 004.66 |
dewey-sort | 14.66 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02444cam a22005412c 4500</leader><controlfield tag="001">ZDB-30-ORH-047690283</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115928.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1784399515</subfield><subfield code="9">1-78439-951-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781784399511</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78439-951-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781784393335</subfield><subfield code="9">978-1-78439-333-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047690283</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047690283</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781784393335</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047690283</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.66</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Verma, Piyush</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Wireshark network security</subfield><subfield code="b">a succinct guide to securely administer your network using Wireshark</subfield><subfield code="c">Piyush Verma</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Succinct guide to securely administer your network using Wireshark</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Online resource; title from cover (Safari, viewed August 26, 2015)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Quality control</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Network performance (Telecommunication)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Qualité ; Contrôle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Performance des réseaux (Télécommunications)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Network Protocols</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Viruses & Malware</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Quality control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures ; Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network performance (Telecommunication)</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781784393335</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781784393335</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781784393335/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047690283 |
illustrated | Illustrated |
indexdate | 2025-06-25T12:15:08Z |
institution | BVB |
isbn | 1784399515 9781784399511 9781784393335 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Packt Publishing |
record_format | marc |
series2 | Community experience distilled |
spelling | Verma, Piyush VerfasserIn aut Wireshark network security a succinct guide to securely administer your network using Wireshark Piyush Verma Succinct guide to securely administer your network using Wireshark Birmingham, UK Packt Publishing 2015 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Community experience distilled Includes index. - Online resource; title from cover (Safari, viewed August 26, 2015) If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed. Computer networks Quality control Network performance (Telecommunication) Computer networks Security measures Computer programs Réseaux d'ordinateurs ; Qualité ; Contrôle Performance des réseaux (Télécommunications) Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels COMPUTERS ; Networking ; Network Protocols COMPUTERS ; Security ; Viruses & Malware Computer networks ; Quality control Computer networks ; Security measures ; Computer programs 9781784393335 Erscheint auch als Druck-Ausgabe 9781784393335 |
spellingShingle | Verma, Piyush Wireshark network security a succinct guide to securely administer your network using Wireshark Computer networks Quality control Network performance (Telecommunication) Computer networks Security measures Computer programs Réseaux d'ordinateurs ; Qualité ; Contrôle Performance des réseaux (Télécommunications) Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels COMPUTERS ; Networking ; Network Protocols COMPUTERS ; Security ; Viruses & Malware Computer networks ; Quality control Computer networks ; Security measures ; Computer programs |
title | Wireshark network security a succinct guide to securely administer your network using Wireshark |
title_alt | Succinct guide to securely administer your network using Wireshark |
title_auth | Wireshark network security a succinct guide to securely administer your network using Wireshark |
title_exact_search | Wireshark network security a succinct guide to securely administer your network using Wireshark |
title_full | Wireshark network security a succinct guide to securely administer your network using Wireshark Piyush Verma |
title_fullStr | Wireshark network security a succinct guide to securely administer your network using Wireshark Piyush Verma |
title_full_unstemmed | Wireshark network security a succinct guide to securely administer your network using Wireshark Piyush Verma |
title_short | Wireshark network security |
title_sort | wireshark network security a succinct guide to securely administer your network using wireshark |
title_sub | a succinct guide to securely administer your network using Wireshark |
topic | Computer networks Quality control Network performance (Telecommunication) Computer networks Security measures Computer programs Réseaux d'ordinateurs ; Qualité ; Contrôle Performance des réseaux (Télécommunications) Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels COMPUTERS ; Networking ; Network Protocols COMPUTERS ; Security ; Viruses & Malware Computer networks ; Quality control Computer networks ; Security measures ; Computer programs |
topic_facet | Computer networks Quality control Network performance (Telecommunication) Computer networks Security measures Computer programs Réseaux d'ordinateurs ; Qualité ; Contrôle Performance des réseaux (Télécommunications) Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels COMPUTERS ; Networking ; Network Protocols COMPUTERS ; Security ; Viruses & Malware Computer networks ; Quality control Computer networks ; Security measures ; Computer programs |
work_keys_str_mv | AT vermapiyush wiresharknetworksecurityasuccinctguidetosecurelyadministeryournetworkusingwireshark AT vermapiyush succinctguidetosecurelyadministeryournetworkusingwireshark |