×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

Ethical Hacking and Network Analysis with Wireshark Manish Sharma

(ebook) (audiobook) (audiobook) Książka w języku 1
Ethical Hacking and Network Analysis with Wireshark Manish Sharma - okladka książki

Ethical Hacking and Network Analysis with Wireshark Manish Sharma - okladka książki

Ethical Hacking and Network Analysis with Wireshark Manish Sharma - audiobook MP3

Ethical Hacking and Network Analysis with Wireshark Manish Sharma - audiobook CD

Autor:
Manish Sharma
Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
402
Dostępne formaty:
     ePub
     Mobi
Zostało Ci na świąteczne zamówienie opcje wysyłki »
Wireshark: A hackers guide to network insights

Key Features
Issue resolution to identify and solve protocol, network, and security issues.
Analysis of network traffic offline through exercises and packet captures.
Expertise in vulnerabilities to gain upper hand on safeguard systems.

Description
Ethical Hacking and Network Analysis with Wireshark provides you with the tools and expertise to demystify the invisible conversations coursing through your cables. This definitive guide, meticulously allows you to leverage the industry-leading Wireshark to gain an unparalleled perspective on your digital landscape.

This book teaches foundational protocols like TCP/IP, SSL/TLS and SNMP, explaining how data silently traverses the digital frontier. With each chapter, Wireshark transforms from a formidable tool into an intuitive extension of your analytical skills. Discover lurking vulnerabilities before they morph into full-blown cyberattacks.

Dissect network threats like a forensic scientist and wield Wireshark to trace the digital pulse of your network, identifying and resolving performance bottlenecks with precision. Restructure your network for optimal efficiency, banish sluggish connections and lag to the digital scrapheap.

What you will learn
Navigate and utilize Wireshark for effective network analysis.
Identify and address potential network security threats.
Hands-on data analysis: Gain practical skills through real-world exercises.
Improve network efficiency based on insightful analysis and optimize network performance.
Troubleshoot and resolve protocol and connectivity problems with confidence.
Develop expertise in safeguarding systems against potential vulnerabilities.

Who this book is for
Whether you are a network/system administrator, network security engineer, security defender, QA engineer, ethical hacker or cybersecurity aspirant, this book helps you to see the invisible and understand the digital chatter that surrounds you.

Table of Contents
1. Ethical Hacking and Networking Concepts
2. Getting Acquainted with Wireshark and Setting up the Environment
3. Getting Started with Packet Sniffing
4. Sniffing on 802.11 Wireless Networks
5. Sniffing Sensitive Information, Credentials and Files
6. Analyzing Network Traffic Based on Protocols
7. Analyzing and Decrypting SSL/TLS Traffic
8. Analyzing Enterprise Applications
9. Analysing VoIP Calls Using Wireshark
10. Analyzing Traffic of IoT Devices
11. Detecting Network Attacks with Wireshark
12. Troubleshooting and Performance Analysis Using Wireshark

Wybrane bestsellery

O autorze książki

Manish Sharma works with Microsoft as a solution architect as part of Microsoft Services. As, a solution architect, he is responsible for leading large enterprise-transformational engagements defining technology/solution roadmaps, conducting architecture and technical evaluations of enterprise engagements, and architecting multimillion-dollar solution developments, and maintenance of outsourcing management. He is also a technology evangelist and speaker at prestigious events, such as Microsoft TechEd on the latest and cutting edge technologies, such as HoloLens, Internet of Things, connected cars, and cloud technologies such as Azure.

BPB Publications - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
80,91 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint
Zabrania się wykorzystania treści strony do celów eksploracji tekstu i danych (TDM), w tym eksploracji w celu szkolenia technologii AI i innych systemów uczenia maszynowego. It is forbidden to use the content of the site for text and data mining (TDM), including mining for training AI technologies and other machine learning systems.