Wireshark 2 quick start guide: secure your network through protocol analysis
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham, UK
Packt Publishing
2018
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781789342789/?ar |
Beschreibung: | Online resource; title from title page (Safari, viewed August 8, 2018) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781789346718 1789346711 9781789342789 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047726067 | ||
003 | DE-627-1 | ||
005 | 20240228120537.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
020 | |a 9781789346718 |c electronic bk. |9 978-1-78934-671-8 | ||
020 | |a 1789346711 |c electronic bk. |9 1-78934-671-1 | ||
020 | |a 9781789342789 |9 978-1-78934-278-9 | ||
035 | |a (DE-627-1)047726067 | ||
035 | |a (DE-599)KEP047726067 | ||
035 | |a (ORHE)9781789342789 | ||
035 | |a (DE-627-1)047726067 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 004.66 |2 23 | |
100 | 1 | |a Mishra, Charit |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Wireshark 2 quick start guide |b secure your network through protocol analysis |c Charit Mishra |
264 | 1 | |a Birmingham, UK |b Packt Publishing |c 2018 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title page (Safari, viewed August 8, 2018) | ||
630 | 2 | 0 | |a Wireshark (Computer file) |
650 | 0 | |a Computer network protocols | |
650 | 0 | |a Computer networks |x Monitoring | |
650 | 0 | |a Packet switching (Data transmission) | |
650 | 0 | |a Packet transport networks | |
650 | 4 | |a Protocoles de réseaux d'ordinateurs | |
650 | 4 | |a Réseaux d'ordinateurs ; Surveillance | |
650 | 4 | |a Commutation de paquets | |
650 | 4 | |a Computer network protocols | |
650 | 4 | |a Computer networks ; Monitoring | |
650 | 4 | |a Packet switching (Data transmission) | |
650 | 4 | |a Packet transport networks | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781789342789/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047726067 |
---|---|
_version_ | 1821494859986370560 |
adam_text | |
any_adam_object | |
author | Mishra, Charit |
author_facet | Mishra, Charit |
author_role | aut |
author_sort | Mishra, Charit |
author_variant | c m cm |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047726067 (DE-599)KEP047726067 (ORHE)9781789342789 |
dewey-full | 004.66 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.66 |
dewey-search | 004.66 |
dewey-sort | 14.66 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01821cam a22004932 4500</leader><controlfield tag="001">ZDB-30-ORH-047726067</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120537.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789346718</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78934-671-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1789346711</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-78934-671-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789342789</subfield><subfield code="9">978-1-78934-278-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047726067</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047726067</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781789342789</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047726067</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.66</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mishra, Charit</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Wireshark 2 quick start guide</subfield><subfield code="b">secure your network through protocol analysis</subfield><subfield code="c">Charit Mishra</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title page (Safari, viewed August 8, 2018)</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Wireshark (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer network protocols</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Monitoring</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Packet switching (Data transmission)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Packet transport networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protocoles de réseaux d'ordinateurs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Surveillance</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Commutation de paquets</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network protocols</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Monitoring</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Packet switching (Data transmission)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Packet transport networks</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781789342789/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047726067 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:05Z |
institution | BVB |
isbn | 9781789346718 1789346711 9781789342789 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Packt Publishing |
record_format | marc |
spelling | Mishra, Charit VerfasserIn aut Wireshark 2 quick start guide secure your network through protocol analysis Charit Mishra Birmingham, UK Packt Publishing 2018 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title page (Safari, viewed August 8, 2018) Wireshark (Computer file) Computer network protocols Computer networks Monitoring Packet switching (Data transmission) Packet transport networks Protocoles de réseaux d'ordinateurs Réseaux d'ordinateurs ; Surveillance Commutation de paquets Computer networks ; Monitoring |
spellingShingle | Mishra, Charit Wireshark 2 quick start guide secure your network through protocol analysis Wireshark (Computer file) Computer network protocols Computer networks Monitoring Packet switching (Data transmission) Packet transport networks Protocoles de réseaux d'ordinateurs Réseaux d'ordinateurs ; Surveillance Commutation de paquets Computer networks ; Monitoring |
title | Wireshark 2 quick start guide secure your network through protocol analysis |
title_auth | Wireshark 2 quick start guide secure your network through protocol analysis |
title_exact_search | Wireshark 2 quick start guide secure your network through protocol analysis |
title_full | Wireshark 2 quick start guide secure your network through protocol analysis Charit Mishra |
title_fullStr | Wireshark 2 quick start guide secure your network through protocol analysis Charit Mishra |
title_full_unstemmed | Wireshark 2 quick start guide secure your network through protocol analysis Charit Mishra |
title_short | Wireshark 2 quick start guide |
title_sort | wireshark 2 quick start guide secure your network through protocol analysis |
title_sub | secure your network through protocol analysis |
topic | Wireshark (Computer file) Computer network protocols Computer networks Monitoring Packet switching (Data transmission) Packet transport networks Protocoles de réseaux d'ordinateurs Réseaux d'ordinateurs ; Surveillance Commutation de paquets Computer networks ; Monitoring |
topic_facet | Wireshark (Computer file) Computer network protocols Computer networks Monitoring Packet switching (Data transmission) Packet transport networks Protocoles de réseaux d'ordinateurs Réseaux d'ordinateurs ; Surveillance Commutation de paquets Computer networks ; Monitoring |
work_keys_str_mv | AT mishracharit wireshark2quickstartguidesecureyournetworkthroughprotocolanalysis |