×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively James H Baxter, Yoram Orzach, Charit Mishra

(ebook) (audiobook) (audiobook) Książka w języku angielskim
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively James H Baxter, Yoram Orzach, Charit Mishra - okladka książki

Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively James H Baxter, Yoram Orzach, Charit Mishra - okladka książki

Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively James H Baxter, Yoram Orzach, Charit Mishra - audiobook MP3

Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively James H Baxter, Yoram Orzach, Charit Mishra - audiobook CD

Autorzy:
James H Baxter, Yoram Orzach, Charit Mishra
Ocena:
Bądź pierwszym, który oceni tę książkę
Dostępne formaty:
     PDF
     ePub
     Mobi
This Learning Path starts off installing Wireshark, before gradually taking you through your first packet capture, identifying and filtering out just the packets of interest, and saving them to a new file for later analysis. You will then discover different ways to create and use capture and display filters. By halfway through the book, you'll be mastering Wireshark features, analyzing different layers of the network protocol, and looking for any anomalies.We then start Ethernet and LAN switching, through IP, and then move on to TCP/UDP with a focus on TCP performance problems. It also focuses on WLAN security. Then, we go through application behavior issues including HTTP, mail, DNS, and other common protocols. This book finishes with a look at network forensics and how to locate security problems that might harm the network.This course provides you with highly practical content explaining Metasploit from the following books:

1) Wireshark Essentials
2) Network Analysis Using Wireshark Cookbook
3) Mastering Wireshark

Wybrane bestsellery

O autorach książki

Yoram Orzach is a senior networks and networks security advisor, providing network design and network security consulting services to a range of clients. Having spent thirty years in network and information security, Yoram has worked as a network and security engineer across many verticals in roles ranging from a network engineer, security consultant, and instructor. Yoram has gained his B.Sc. from the Technion in Haifa, Israel. Yoram's experience is both with corporate networks; service providers and Internet service providers' networks. His customers are Motorola solutions, Elbit Systems, 888, Taboola, Bezeq, PHI Networks, Cellcom, Strauss group, and many other hi-tech companies.
Charit Mishra is an ICS/SCADA security professional. He works as a security architect for critical infrastructure industry (oil and gas, energy and utility, transport, telecom, and so on) and holds extensive experience in security standards, framework, and technologies, with real hands-on experience in security. He has obtained leading industry certifications, such as OSCP, CEH, CompTIA Security+, and CCNA R&S. Also, he holds a master's degree in computer science. He regularly delivers professional trainings on critical infrastructure security internationally.

James H Baxter, Yoram Orzach, Charit Mishra - pozostałe książki

Packt Publishing - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
386,10 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint
Zabrania się wykorzystania treści strony do celów eksploracji tekstu i danych (TDM), w tym eksploracji w celu szkolenia technologii AI i innych systemów uczenia maszynowego. It is forbidden to use the content of the site for text and data mining (TDM), including mining for training AI technologies and other machine learning systems.