LEADER 03720nam 22005055 450 001 9910637718803321 005 20230224132746.0 010 $a1-4842-9001-1 024 7 $a10.1007/978-1-4842-9001-9 035 $a(MiAaPQ)EBC7165592 035 $a(Au-PeEL)EBL7165592 035 $a(CKB)25913864500041 035 $a(OCoLC)1356910201 035 $a(OCoLC-P)1356910201 035 $a(DE-He213)978-1-4842-9001-9 035 $a(CaSebORM)9781484290019 035 $a(PPN)268211841 035 $a(EXLCZ)9925913864500041 100 $a20221230d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aWireshark for Network Forensics $eAn Essential Guide for IT and Cloud Professionals /$fby Nagendra Kumar Nainar, Ashish Panda 205 $a1st ed. 2023. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2023. 215 $a1 online resource (283 pages) 300 $aIncludes index. 311 08$aPrint version: Nainar, Nagendra Kumar Wireshark for Network Forensics Berkeley, CA : Apress L. P.,c2023 9781484290002 320 $aIncludes bibliographical references and index. 327 $aCh1:Wireshark Primer -- Ch 2: Packet Capture and Analysis -- Ch 3: Capturing Secured Application for Analysis -- Ch 4: Wireless Packet Capture and Analysis -- Ch 5: Multimedia Capture and Analysis -- Ch 6:Cloud and Cloud-Native Traffic Capture -- Ch 7: Bluetooth Protocol Capture and Analysis -- Ch 8: Wireshark Analysis and Network Forensic. - Ch 9: Writing your own Dissector. 330 $aWith the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. You will: Review Wireshark analysis and network forensics Study traffic capture and its analytics from mobile devices Analyze various access technology and cloud traffic Write your own dissector for any new or proprietary packet formats Capture secured application traffic for analysis. 606 $aComputer networks$xSecurity measures 615 0$aComputer networks$xSecurity measures. 676 $a004.62 700 $aNainar$b Nagendra Kumar$01207009 702 $aPanda$b Ashish 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910637718803321 996 $aWireshark for Network Forensics$93003131 997 $aUNINA