- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Dive into the capabilities of Wireshark with "Wireshark Essentials," a concise guide focused on utilizing packet analysis for network security and troubleshooting.
Andere Kunden interessierten sich auch für
- Kerry Ann AndersonThe Frugal Ciso60,99 €
- Bill StackpoleSoftware Deployment, Updating, and Patching74,99 €
- Anne KohnkeThe Complete Guide to Cybersecurity Risks and Controls57,99 €
- Bradley FowlerCybersecurity Public Policy74,99 €
- Amanda AndressSurviving Security74,99 €
- Toby DerocheAgile Audit Transformation and Beyond54,99 €
- Thomas R PeltierInformation Security Fundamentals88,99 €
-
-
-
Dive into the capabilities of Wireshark with "Wireshark Essentials," a concise guide focused on utilizing packet analysis for network security and troubleshooting.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 248
- Erscheinungstermin: 9. September 2025
- Englisch
- Abmessung: 234mm x 156mm
- ISBN-13: 9781032887098
- ISBN-10: 1032887095
- Artikelnr.: 73778942
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 248
- Erscheinungstermin: 9. September 2025
- Englisch
- Abmessung: 234mm x 156mm
- ISBN-13: 9781032887098
- ISBN-10: 1032887095
- Artikelnr.: 73778942
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Arun Soni is an internationally acclaimed author and cybersecurity expert from Chandigarh (India). He has authored 182 books covering various subjects, including IT, AI, and Cybersecurity. His books are widely read in India and abroad by millions of students. * He is a Certified Ethical Hacker (CEH) from the EC Council (US), a Digital Evidence Specialist (DES) from the Asian School of Cyber Laws in Pune, and a Cybersecurity Consultant. He is a cybersecurity trainer who works to spread awareness by conducting webinars/seminars and workshops in schools, colleges, and corporations. * He has been honoured with the prestigious 'Distinguished Author Award' by the Federation of Educational Publishers in India (FEPI). * His name appears in the Limca Book of Records for writing the most computer books at 37. He also holds many other national and international records. * Since February 2024, he has been associated with India's topmost National Stock Exchange Academy (NSE Academy) as a content writer, creating cybersecurity modules for the worldwide market. * He is also a former Director of the YMCA, Computer Center, Chandigarh (India). For his contribution to computer education and Cybersecurity, he has been admired and covered by many major news portals, magazines, and newspapers such as The Tribune, The Indian Express, Times of India, Dainik Bhaskar, Yahoo News, The Economic Times, Business Standard, ANI News, The Print, Zee 5, Daily Hunt, England News portal, France network Time, Kuwait Times, UAE Times, Vancouver Herald, and many others. He also appeared as an expert commentator on several nationwide TV channels and FM radio.
Preface Author Biography Chapter 1: Cybersecurity Foundations And Wireshark
Chapter 2: Networking Concepts And The OSI Model Chapter 3: Installing and
Using Wireshark Chapter 4: Basics of Packet Capturing Chapter 5: Utilising
Display Filters In Wireshark Chapter 6: Analysing Protocols with Wireshark
Chapter 7 Network Troubleshooting Techniques Using Wireshark Chapter 8:
Enhancing Network Security with Wireshark Chapter 9: Wireshark For Port
Security Chapter 10: Detecting And Analysing MITM Attacks Chapter 11:
Solving DNS-Related Issues Chapter 12: Identifying DDoS Attacks Chapter 13:
Deep Packet Analysis with Advanced Functionalities Chapter 14: Real-World
Applications and Case Studies Chapter 15: Lab Time Scenarios Further
Reading
Chapter 2: Networking Concepts And The OSI Model Chapter 3: Installing and
Using Wireshark Chapter 4: Basics of Packet Capturing Chapter 5: Utilising
Display Filters In Wireshark Chapter 6: Analysing Protocols with Wireshark
Chapter 7 Network Troubleshooting Techniques Using Wireshark Chapter 8:
Enhancing Network Security with Wireshark Chapter 9: Wireshark For Port
Security Chapter 10: Detecting And Analysing MITM Attacks Chapter 11:
Solving DNS-Related Issues Chapter 12: Identifying DDoS Attacks Chapter 13:
Deep Packet Analysis with Advanced Functionalities Chapter 14: Real-World
Applications and Case Studies Chapter 15: Lab Time Scenarios Further
Reading
Preface Author Biography Chapter 1: Cybersecurity Foundations And Wireshark
Chapter 2: Networking Concepts And The OSI Model Chapter 3: Installing and
Using Wireshark Chapter 4: Basics of Packet Capturing Chapter 5: Utilising
Display Filters In Wireshark Chapter 6: Analysing Protocols with Wireshark
Chapter 7 Network Troubleshooting Techniques Using Wireshark Chapter 8:
Enhancing Network Security with Wireshark Chapter 9: Wireshark For Port
Security Chapter 10: Detecting And Analysing MITM Attacks Chapter 11:
Solving DNS-Related Issues Chapter 12: Identifying DDoS Attacks Chapter 13:
Deep Packet Analysis with Advanced Functionalities Chapter 14: Real-World
Applications and Case Studies Chapter 15: Lab Time Scenarios Further
Reading
Chapter 2: Networking Concepts And The OSI Model Chapter 3: Installing and
Using Wireshark Chapter 4: Basics of Packet Capturing Chapter 5: Utilising
Display Filters In Wireshark Chapter 6: Analysing Protocols with Wireshark
Chapter 7 Network Troubleshooting Techniques Using Wireshark Chapter 8:
Enhancing Network Security with Wireshark Chapter 9: Wireshark For Port
Security Chapter 10: Detecting And Analysing MITM Attacks Chapter 11:
Solving DNS-Related Issues Chapter 12: Identifying DDoS Attacks Chapter 13:
Deep Packet Analysis with Advanced Functionalities Chapter 14: Real-World
Applications and Case Studies Chapter 15: Lab Time Scenarios Further
Reading