Wireshark for network forensics: an essential guide for IT and cloud professionals
With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
New York, NY
Apress
[2023]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781484290019/?ar |
Zusammenfassung: | With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. |
Beschreibung: | Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on January 17, 2023) |
Umfang: | 1 Online-Ressource (283 Seiten) illustrations |
ISBN: | 9781484290019 1484290011 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-088959775 | ||
003 | DE-627-1 | ||
005 | 20240228121901.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230215s2023 xx |||||o 00| ||eng c | ||
020 | |a 9781484290019 |c electronic bk. |9 978-1-4842-9001-9 | ||
020 | |a 1484290011 |c electronic bk. |9 1-4842-9001-1 | ||
035 | |a (DE-627-1)088959775 | ||
035 | |a (DE-599)KEP088959775 | ||
035 | |a (ORHE)9781484290019 | ||
035 | |a (DE-627-1)088959775 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a U |2 bicssc | |
072 | 7 | |a COM051390 |2 bisacsh | |
082 | 0 | |a 005.8 |2 23/eng/20230105 | |
100 | 1 | |a Nainar, Nagendra Kumar |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Wireshark for network forensics |b an essential guide for IT and cloud professionals |c Nagendra Kumar Nainar, Ashish Panda |
264 | 1 | |a New York, NY |b Apress |c [2023] | |
300 | |a 1 Online-Ressource (283 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on January 17, 2023) | ||
520 | |a With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures | |
700 | 1 | |a Panda, Ashish |e VerfasserIn |4 aut | |
776 | 1 | |z 1484290003 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1484290003 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484290019/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-088959775 |
---|---|
_version_ | 1821494816034258944 |
adam_text | |
any_adam_object | |
author | Nainar, Nagendra Kumar Panda, Ashish |
author_facet | Nainar, Nagendra Kumar Panda, Ashish |
author_role | aut aut |
author_sort | Nainar, Nagendra Kumar |
author_variant | n k n nk nkn a p ap |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)088959775 (DE-599)KEP088959775 (ORHE)9781484290019 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03133cam a22004452 4500</leader><controlfield tag="001">ZDB-30-ORH-088959775</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121901.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230215s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484290019</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4842-9001-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484290011</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4842-9001-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)088959775</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP088959775</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484290019</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)088959775</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">U</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM051390</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230105</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nainar, Nagendra Kumar</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Wireshark for network forensics</subfield><subfield code="b">an essential guide for IT and cloud professionals</subfield><subfield code="c">Nagendra Kumar Nainar, Ashish Panda</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Apress</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (283 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on January 17, 2023)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Panda, Ashish</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1484290003</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1484290003</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484290019/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-088959775 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:23Z |
institution | BVB |
isbn | 9781484290019 1484290011 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (283 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Apress |
record_format | marc |
spelling | Nainar, Nagendra Kumar VerfasserIn aut Wireshark for network forensics an essential guide for IT and cloud professionals Nagendra Kumar Nainar, Ashish Panda New York, NY Apress [2023] 1 Online-Ressource (283 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on January 17, 2023) With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Panda, Ashish VerfasserIn aut 1484290003 Erscheint auch als Druck-Ausgabe 1484290003 |
spellingShingle | Nainar, Nagendra Kumar Panda, Ashish Wireshark for network forensics an essential guide for IT and cloud professionals Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
title | Wireshark for network forensics an essential guide for IT and cloud professionals |
title_auth | Wireshark for network forensics an essential guide for IT and cloud professionals |
title_exact_search | Wireshark for network forensics an essential guide for IT and cloud professionals |
title_full | Wireshark for network forensics an essential guide for IT and cloud professionals Nagendra Kumar Nainar, Ashish Panda |
title_fullStr | Wireshark for network forensics an essential guide for IT and cloud professionals Nagendra Kumar Nainar, Ashish Panda |
title_full_unstemmed | Wireshark for network forensics an essential guide for IT and cloud professionals Nagendra Kumar Nainar, Ashish Panda |
title_short | Wireshark for network forensics |
title_sort | wireshark for network forensics an essential guide for it and cloud professionals |
title_sub | an essential guide for IT and cloud professionals |
topic | Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
topic_facet | Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
work_keys_str_mv | AT nainarnagendrakumar wiresharkfornetworkforensicsanessentialguideforitandcloudprofessionals AT pandaashish wiresharkfornetworkforensicsanessentialguideforitandcloudprofessionals |