Wireshark for security professionals using Wireshark and the Metasploit Framework
Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples.
Saved in:
| Main Authors: | Bullock, Jessey (Author), Gordon, Adam (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
Wiley
[2017]
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Wireshark Network Analysis: The Official Wireshark Certified Network Analysis: The Official Wireshark Certified Network Analyst Study Guide
by: Chappell, L.
by: Chappell, L.
CCSP (ISC)2 certified cloud security professional official study guide
by: O'Hara, Brian T., et al.
Published: (2017)
by: O'Hara, Brian T., et al.
Published: (2017)
Metasploit bootcamp a fast-paced guide to enhance your pentesting skills
by: Jaswal, Nipun
Published: (2017)
by: Jaswal, Nipun
Published: (2017)
Threat modeling designing for security
by: Shostack, Adam
Published: (2014)
by: Shostack, Adam
Published: (2014)
Security awareness applying practical security in your world
by: Ciampa
Published: (2004)
by: Ciampa
Published: (2004)
IT governance and information security guides, standards, and frameworks
by: Maleh, Yassine, et al.
Published: (2022)
by: Maleh, Yassine, et al.
Published: (2022)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Security for the digital world within an ethical framework
Published: (2016)
Published: (2016)
Computer Security Fundamentals
by: Easttom, Chuck
Published: (2020)
by: Easttom, Chuck
Published: (2020)
Computer and information security
Published: (2016)
Published: (2016)
Guide to network security
by: Whitman, Michael E., et al.
Published: (2013)
by: Whitman, Michael E., et al.
Published: (2013)
Computer security art and science
by: Bishop, Matt
Published: (2019)
by: Bishop, Matt
Published: (2019)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2015)
by: Stallings, William, et al.
Published: (2015)
Information Security : Principles and Practice /
by: Stamp, Mark
Published: (2022)
by: Stamp, Mark
Published: (2022)
Computer security art and science
by: Bishop lhMatt
by: Bishop lhMatt
Computer security basics
by: Lehtinen, Rick
Published: (2006)
by: Lehtinen, Rick
Published: (2006)
Information security culture a human firewall approach
by: Omar Zakaria
Published: (2013)
by: Omar Zakaria
Published: (2013)
Windows security monitoring scenarios and patterns
by: Miroshnikov, Andreĭ
Published: (2018)
by: Miroshnikov, Andreĭ
Published: (2018)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Data-Driven Security Analysis, Visualization and Dashboards
by: Jacobs, Jay
Published: (2014)
by: Jacobs, Jay
Published: (2014)
Designing security architecture solutions
by: Ramachandran, Jay
Published: (2002)
by: Ramachandran, Jay
Published: (2002)
Fundamentals of computer security technology
by: Amoroso
Published: (1994)
by: Amoroso
Published: (1994)
Information security architecture an integrated approach to security in the organization
by: Tudor, Jan Killmeyer
Published: (2006)
by: Tudor, Jan Killmeyer
Published: (2006)
Computer security literacy staying safe in a digital world
by: Jacobson, Douglas
Published: (2013)
by: Jacobson, Douglas
Published: (2013)
Securing PHP Apps
by: Edmunds, Ben
Published: (2016)
by: Edmunds, Ben
Published: (2016)
Computer Security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Managing information security
Published: (2014)
Published: (2014)
Computer communications security
by: Ford lhWarwick
by: Ford lhWarwick
Empirical research for software security foundations and experience
Published: (2018)
Published: (2018)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Security in computing
by: Pfleegar, Charles P.
Published: (1997)
by: Pfleegar, Charles P.
Published: (1997)
Securing client/server computer networks
by: Davis
Published: (1996)
by: Davis
Published: (1996)
The official (ISC) guide to the CCSP CBK
by: Gordon, Adam
Published: (2016)
by: Gordon, Adam
Published: (2016)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Information Security Risk Management for Iso27001/Iso 27002
by: Calder, Alan
Published: (2019)
by: Calder, Alan
Published: (2019)
Defensive security handbook best practices for securing infrastructure
by: Brotherston, Lee, et al.
Published: (2017)
by: Brotherston, Lee, et al.
Published: (2017)
Developments in information security and cybernetic wars
Published: (2019)
Published: (2019)
Similar Items
-
Wireshark Network Analysis: The Official Wireshark Certified Network Analysis: The Official Wireshark Certified Network Analyst Study Guide
by: Chappell, L. -
CCSP (ISC)2 certified cloud security professional official study guide
by: O'Hara, Brian T., et al.
Published: (2017) -
Metasploit bootcamp a fast-paced guide to enhance your pentesting skills
by: Jaswal, Nipun
Published: (2017) -
Threat modeling designing for security
by: Shostack, Adam
Published: (2014) -
Security awareness applying practical security in your world
by: Ciampa
Published: (2004)


