Inicio > > Redes y comunicaciones informáticas > Network Forensics with Wireshark
Network Forensics with Wireshark

Network Forensics with Wireshark

Bhavik Shah

45,73 €
IVA incluido
Disponible
Editorial:
Orange Education Pvt Ltd
Año de edición:
2025
Materia
Redes y comunicaciones informáticas
ISBN:
9789349888456
45,73 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Demystifying Network Traces with Wireshark.Key Features● Decode and analyze network packets using Wireshark.● Detect malware, and covert channel attacks in live traffic.● Decrypt SSL/TLS traffic, and trace attacks end-to-end.Book DescriptionIn today’s digital world, Wireshark stands as the most powerful tool for uncovering what truly happens on a network.Network Forensics with Wireshark will take you through a structured, hands-on journey - from grasping the basics of TCP/IP communication to advanced forensic analysis. Beginning with how data flows across networks, readers will learn to capture and interpret packets, identify anomalies, and analyze encrypted traffic through SSL/TLS decryption. As the book progresses, it dives into detecting malware behavior, tracing covert channel attacks, and understanding how attackers exploit vulnerabilities across evolving network architectures. Each concept is reinforced with practical exercises and real-world case studies, helping readers apply theory to investigation.So, whether you are a student, network engineer, or cybersecurity professional, this book empowers you to analyze smarter, respond faster, and transform data into actionable security insight.What you will learn● Understand core network protocols and packet flow in depth.● Capture, filter, and analyze traffic using Wireshark effectively.● Identify anomalies, threats, and malware patterns in captures.● Perform SSL decryption, and inspect encrypted traffic behavior.● Reconstruct and analyze the complete cyber kill chain visually.● Apply forensic techniques to detect and prevent network breaches.Table of Contents1. Overview of TCP/IP Model2. Flow of Internet Traffic3. SSL and Certificate Chaining4. Evolving Network Architecture5. Introduction to Wireshark6. Tools to Analyze Wireshark Traffic7. Malware Analysis on Wireshark IndexAbout the AuthorsBhavik Shah has over 17 years of experience in Cyber Security, with deep expertise in designing and architecting networks where security is a primary focus. He has been a speaker at several universities, delivering talks on Network Forensics, and also at Cybersecurity Communities like Null. He has also spoken at Cisco Live on topics related to AI security and its various components. Through his first book, Network Forensics with Wireshark, Bhavik aims to highlight the significance of Wireshark, and how it can help in analyzing Network Traces efficiently.

Artículos relacionados

  • Next Generation Search Engines
    Recent technological progress in computer science, Web technologies, and the constantly evolving information available on the Internet has drastically changed the landscape of search and access to information. Current search engines employ advanced techniques involving machine learning, social networks, and semantic analysis. Next Generation Search Engines: Advanced Models for ...
  • Collaboration and the Semantic Web
    Collaborative working has been increasingly viewed as a good practice for organizations to achieve efficiency. Organizations that work well in collaboration may have access to new sources of funding, deliver new, improved, and more integrated services, make savings on shared costs, and exchange knowledge, information and expertise. Collaboration and the Semantic Web: Social Net...
  • Resource Allocation in Next-Generation Broadband Wireless Access Networks
    With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research o...
  • Advanced Topics in Information Technology Standards and Standardization Research, Volume 1
    Kai Jakobs
    ...
  • Data Warehouses and OLAP
    ...
  • Selected Readings on Database Technologies and Applications
    Terry Halpin
    Education and research in the field of database technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Database Technologies and Applications supplements course instruction and student research with quality chapters focused on key issues concerning the development, design, and analysis ...