LEADER 00000cam a2200661 a 4500 001 849934146 003 OCoLC 005 20240129213017.0 006 m o d 007 cr cnu---unuuu 008 130525s2013 enka o 000 0 eng d 015 GBC1H5207|2bnb 016 7 018005362|2Uk 019 855544948|a1259146600 020 9781782165385|q(electronic bk.) 020 178216538X|q(electronic bk.) 020 9781782165392|qElectronic book (EPUB format) 020 1782165398 029 1 AU@|b000052006786 029 1 DEBBG|bBV041431274 029 1 DEBBG|bBV043776479 029 1 DEBSZ|b398271194 029 1 DEBSZ|b472790757 029 1 GBVCP|b785369465 029 1 UKMGB|b018005362 035 (OCoLC)849934146|z(OCoLC)855544948|z(OCoLC)1259146600 037 CL0500000257|bSafari Books Online 040 E7B|beng|epn|cE7B|dOCLCO|dN$T|dUMI|dDEBSZ|dOCLCQ|dOCLCF |dOCLCQ|dAGLDB|dOCLCQ|dJBG|dU3W|dVTS|dCEF|dOCLCQ|dSTF|dUAB |dM8D|dHS0|dUKMGB|dOCLCO|dOCLCQ|dQGK|dOCLCO|dOCLCQ 049 INap 082 04 004.62 082 04 004.62|223 099 eBook O’Reilly for Public Libraries 100 1 Merino, Borja. 245 10 Instant traffic analysis with Tshark how-to :|bmaster the terminal-based version of Wireshark for dealing with network security incidents /|cBorja Merino.|h[O'Reilly electronic resource] 260 Birmingham, U.K. :|bPackt Publishing,|c©2013. 300 1 online resource 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 347 text file 504 Includes bibliographical references. 505 0 Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter: Instant Traffic Analysis with Tshark How-to; Capturing data with Tshark (Must know); Capturing traffic (Must know); Delimiting network problems (Should know); Implementing useful filters (Should know); Decoding protocols (Become an expert); Auditing network attacks (Become an expert); Analyzing network forensic data (Become an expert); Auditing network applications (Must know); Analyzing malware traffic (Must know); Automating tasks (Must know) 520 Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This How-to guide will explore TShark.As this is the terminal version, it will show the user all commands and syntax as well as all options for Tshark and its common uses through small recipes.This book is intended for network administrators and security officers who have to deal daily with a variety of network problems and security incidents. It will also be a good learning aid for Cisco students wishing to implement and understand the many theoretical concepts related to traffic d. 546 English. 588 0 Online resource; title from title page (ebrary, viewed May 21, 2013). 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Computer network protocols. 650 0 Packet switching (Data transmission) 650 6 Protocoles de réseaux d'ordinateurs. 650 6 Commutation de paquets. 650 7 Computer network protocols|2fast 650 7 Packet switching (Data transmission)|2fast 776 |z1-78216-539-8 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9781782165385/?ar |zAvailable on O’Reilly for Public Libraries 938 ebrary|bEBRY|nebr10695798 938 EBSCOhost|bEBSC|n575942 994 92|bJFN