Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Tactical Wireshark

Best Price (Coupon Required):
Buy Tactical Wireshark for $45.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $49.99 - $49.99
BEST PRICE

Single Product Purchase

$45.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$49.99 $49.99

10% OFF
This deals requires coupon
$45.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9781484292914
Condition
New
Product Description

Take a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer. This book will show you how to effectively manipulate and monitor different conversations and perform statistical analysis of these conversations to identify the IP and TCP information of interest. Next, you'll be walked through a review of the different methods malware uses, from inception through the spread across and compromise of a network of machines. The process from the initial click through intrusion, the characteristics of Command and Control (C2), and the different types of lateral movement will be detailed at the packet level. In the final part of the book, you'll explore the network capture file and identification of data for a potential forensics extraction, including inherent capabilities for the extraction of objects such as file data and other corresponding components in support of a forensics investigation. After completing this book, you will have a complete understanding of the process of carving files from raw PCAP data within the Wireshark tool. What You Will Learn Use Wireshark to identify intrusions into a network Exercise methods to uncover network data even when it is in encrypted form Analyze malware Command and Control (C2) communications and identify IOCs Extract data in a forensically sound manner to support investigations Leverage capture file statistics to reconstruct network events Who This Book Is For Network analysts, Wireshark analysts, and digital forensic analysts.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Psychological Ownership im Kontext der Unternehmensnachfolge

Psychological Ownership im Kontext der Unternehmensnachfolge

$69.99
Downstream Processing of Proteins

Downstream Processing of Proteins

$84.99
Der Konzernabschlu

Der Konzernabschlu

$69.99
107. Kongre der Deutschen Gesellschaft fr Chirurgie Berlin, 17.21. April 1990

107. Kongre der Deutschen Gesellschaft fr Chirurgie Berlin, 17.21. April 1990

$69.99
Transactions on Computational Science XXXVI

Transactions on Computational Science XXXVI

$39.99
Polarimetric Microwave Imaging

Polarimetric Microwave Imaging

$199.99
Evangelical Women in Belfast

Evangelical Women in Belfast

$54.99
Flexible Bronchoskopie fr Einsteiger

Flexible Bronchoskopie fr Einsteiger

$99.99
Deutsche Vereinigung, Kapitalbildung und Beschftigung

Deutsche Vereinigung, Kapitalbildung und Beschftigung

$59.99
The Girl from the Sea

The Girl from the Sea

$11.24
Smart Transportation Systems 2023

Smart Transportation Systems 2023

$189.00
Race, Ralph Ellison and American Cold War Intellectual Culture

Race, Ralph Ellison and American Cold War Intellectual Culture

$54.99
Die progressiv-dystrophischen Myopathien

Die progressiv-dystrophischen Myopathien

$69.99
Origin and Continuity of Cell Organelles

Origin and Continuity of Cell Organelles

$39.99
An Absence of Competition

An Absence of Competition

$119.99
Experimentelle Untersuchung eines Dual-Fuel-Brennverfahrens fr schwere Nutzfahrzeugmotoren

Experimentelle Untersuchung eines Dual-Fuel-Brennverfahrens fr schwere Nutzfahrzeugmotoren

$49.99
Gesundheitserziehung bei Kindern und Jugendlichen

Gesundheitserziehung bei Kindern und Jugendlichen

$34.99
Advances in Spatial Data Handling and GIS

Advances in Spatial Data Handling and GIS

$169.99
Critical Information Infrastructures Security

Critical Information Infrastructures Security

$54.99
Uranium in the Environment

Uranium in the Environment

$329.99
Poultry Meat and Egg Production

Poultry Meat and Egg Production

$84.99
Power and Resistance in the New World Order

Power and Resistance in the New World Order

$84.99
Factorization and Integrable Systems

Factorization and Integrable Systems

$84.99
Artificial Intelligence Techniques for a Scalable Energy Transition

Artificial Intelligence Techniques for a Scalable Energy Transition

$99.00
Der Felsbau, Band 3

Der Felsbau, Band 3

$149.99
Information and Communications Security

Information and Communications Security

$54.99
The Thymus Gland

The Thymus Gland

$109.99
Nail Disorders

Nail Disorders

$139.99
Soils Under Stress

Soils Under Stress

$84.99
Critical Rationalism, Metaphysics and Science

Critical Rationalism, Metaphysics and Science

$169.99
Medienwandel kompakt 2017-2019

Medienwandel kompakt 2017-2019

$49.99
Knots, Low-Dimensional Topology and Applications

Knots, Low-Dimensional Topology and Applications

$199.99
The State Immunity Controversy in International Law

The State Immunity Controversy in International Law

$219.00
Distributed Computing

Distributed Computing

$39.99
Management des Melanoms

Management des Melanoms

$44.99
Hand transplantation

Hand transplantation

$229.00
Collaborative Engineering

Collaborative Engineering

$109.99
Avian Ancestors

Avian Ancestors

$54.99
Anwenderhandbuch HP-41 C/CV

Anwenderhandbuch HP-41 C/CV

$79.99
Mimetic Theory and Islam

Mimetic Theory and Islam

$99.99
previous
next