Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200661 a 4500 
001    849934146 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr cnu---unuuu 
008    130525s2013    enka    o     000 0 eng d 
015    GBC1H5207|2bnb 
016 7  018005362|2Uk 
019    855544948|a1259146600 
020    9781782165385|q(electronic bk.) 
020    178216538X|q(electronic bk.) 
020    9781782165392|qElectronic book (EPUB format) 
020    1782165398 
029 1  AU@|b000052006786 
029 1  DEBBG|bBV041431274 
029 1  DEBBG|bBV043776479 
029 1  DEBSZ|b398271194 
029 1  DEBSZ|b472790757 
029 1  GBVCP|b785369465 
029 1  UKMGB|b018005362 
035    (OCoLC)849934146|z(OCoLC)855544948|z(OCoLC)1259146600 
037    CL0500000257|bSafari Books Online 
040    E7B|beng|epn|cE7B|dOCLCO|dN$T|dUMI|dDEBSZ|dOCLCQ|dOCLCF
       |dOCLCQ|dAGLDB|dOCLCQ|dJBG|dU3W|dVTS|dCEF|dOCLCQ|dSTF|dUAB
       |dM8D|dHS0|dUKMGB|dOCLCO|dOCLCQ|dQGK|dOCLCO|dOCLCQ 
049    INap 
082 04 004.62 
082 04 004.62|223 
099    eBook O’Reilly for Public Libraries 
100 1  Merino, Borja. 
245 10 Instant traffic analysis with Tshark how-to :|bmaster the 
       terminal-based version of Wireshark for dealing with 
       network security incidents /|cBorja Merino.|h[O'Reilly 
       electronic resource] 
260    Birmingham, U.K. :|bPackt Publishing,|c©2013. 
300    1 online resource 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    text file 
504    Includes bibliographical references. 
505 0  Cover; Copyright; Credits; About the Author; About the 
       Reviewer; www.PacktPub.com; Table of Contents; Preface; 
       Chapter: Instant Traffic Analysis with Tshark How-to; 
       Capturing data with Tshark (Must know); Capturing traffic 
       (Must know); Delimiting network problems (Should know); 
       Implementing useful filters (Should know); Decoding 
       protocols (Become an expert); Auditing network attacks 
       (Become an expert); Analyzing network forensic data 
       (Become an expert); Auditing network applications (Must 
       know); Analyzing malware traffic (Must know); Automating 
       tasks (Must know) 
520    Filled with practical, step-by-step instructions and clear
       explanations for the most important and useful tasks. This
       How-to guide will explore TShark.As this is the terminal 
       version, it will show the user all commands and syntax as 
       well as all options for Tshark and its common uses through
       small recipes.This book is intended for network 
       administrators and security officers who have to deal 
       daily with a variety of network problems and security 
       incidents. It will also be a good learning aid for Cisco 
       students wishing to implement and understand the many 
       theoretical concepts related to traffic d. 
546    English. 
588 0  Online resource; title from title page (ebrary, viewed May
       21, 2013). 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Computer network protocols. 
650  0 Packet switching (Data transmission) 
650  6 Protocoles de réseaux d'ordinateurs. 
650  6 Commutation de paquets. 
650  7 Computer network protocols|2fast 
650  7 Packet switching (Data transmission)|2fast 
776    |z1-78216-539-8 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781782165385/?ar
       |zAvailable on O’Reilly for Public Libraries 
938    ebrary|bEBRY|nebr10695798 
938    EBSCOhost|bEBSC|n575942 
994    92|bJFN