Wireshark for security professionals using Wireshark and the Metasploit Framework

Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples.

Saved in:
Bibliographic Details
Main Authors: Bullock, Jessey (Author), Gordon, Adam (Author)
Format: Book
Language:English
Published: Indianapolis, IN Wiley [2017]
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 53250
003 MY-KLNDU
005 20241219014413.0
008 221104s2017 inua 001 0 eng d
020 |a 9781118918210 
020 |z 9781118918227 (electronic bk.) 
020 |z 9781118918234 (electronic bk.) 
039 9 |a 202211041229  |b VLOAD  |c 202002031522  |d azraai  |c 202002031522  |d azraai  |y 201904021651  |z helmey 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a QA 76.9.A25  |b B855 2017 
100 1 |a Bullock, Jessey  |e author 
245 1 0 |a Wireshark for security professionals  |b using Wireshark and the Metasploit Framework  |c Jessey Bullock, Jeff T. Parker 
264 1 |a Indianapolis, IN  |b Wiley  |c [2017] 
264 4 |c ©2017 
300 |a xvi, 272 pages  |b illustrations  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
500 |a Includes index 
520 |a Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. 
592 |a 00101/HL/2019 (750)  |b 19/9/2019  |c RM245.10  |h Han Lin Books 
650 0 |a Computer security 
700 1 |a Gordon, Adam  |e author 
999 |a vtls000063146  |c 53250  |d 53250