Amazon Price: $49.99 $49.99 (as of August 15, 2018 22:37 –
This book will be a massive ally in troubleshooting your network using Wireshark, the world's most popular analyzer. Over 100 practical recipes provide a focus on real-life situations, helping you resolve your own individual issues.
Overview Place Wireshark in your network and configure it for effective network analysis Configure capture and display filters to get the required data Use Wireshark’s powerful statistical tools to analyze your network and its expert system to pinpoint network problems
Continue reading “Network Analysis Using Wireshark Cookbook”
Amazon Price: $24.99 $24.44 You save: $0.55 (2%). (as of August 15, 2018 22:37 –
A quick and easy guide to getting started with network analysis using Wireshark
Overview Learn something new in an Instant! A short, fast, focused guide delivering immediate results. Documents key features and tasks that can be performed using Wireshark. Covers details of filters, statistical analysis, and other important tasks. Also includes advanced topics like decoding captured data, name resolution, and reassembling
Wireshark is by far the most popular network traffic analyzing tool.
It not only provides an interface for traffic capture but also provides a rich platform for an in-depth analysis of the traffic. The GUI provides a very user friendly and interactive media that simplifies the process of network forensics. This concise book provides a perfect start to getting hands-on with packet analysis using Wireshark.
Instant Wireshark Starter is the perfect guide for new learners who are willing to dive into the world of computer networks. Walking you through from the very start, it transitions smoothly to cover core topics like filters, decoding packets, command line tools, and more. It covers every inch of Wireshark in a concise and comprehensive manner.
Instant Wireshark Starter has been designed keeping basic learners in mind. After initial setup, the book leads you through your first packet capture followed by some core topics like analyzing the captured traffic and understanding filters.
You will then be guided through more detailed topics like the decoding of captured packets, generating graphs based on statistics, and name resolution. Finally the book concludes by providing information about further references and official sources to learn more about the tool.
What you will learn from this book Learn how to effectively utilize Wireshark. Capture and decode data packets. Understand protocol representation in Wireshark alongside statistical analysis. Implement display and capture filters. Import and export capture files.
Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. Written as a practical guide, Wireshark Starter will show you all you need to know to effectively capture and analyze network traffic.
Who this book is written for
This book is specially designed for new learners who are willing to dive deeper into network analysis using Wireshark. It requires a basic understanding of network protocols and their implementation and is equally handy for network administrators, forensic experts, and network penetration testers.
Amazon Price: $14.95 $14.95 (as of August 15, 2018 22:37 –
The angles of attack in today’s cyber security landscape evolve every moment. But even more ominous, there is no organization too small to escape being a target. However, there is an answer to these threats: a good sheepdog, alert to every danger and breach. In Wolves, Sheep and Sheepdogs: A Leader’s Guide to Information Security, authors Jim Shaeffer and John Cunningham use a powerful analogy to paint a vivid picture of both sides of the firewall. Whether you are a Board Member, investor, CEO or CISO you will gain a deeper understanding of the roles, characteristics, and motivations of both security professionals and the wolves they guard against. Shaeffer and Cunningham have worked with scores of organizations and share some of their keenest insight to achieving an adaptive security mindset. In doing so, they create a common language for those in both information security and non-technical leadership positions. No matter your role, this book will help give your organization a cyber-security edge against the threats of today and tomorrow.
Amazon Price: $44.32 (as of August 14, 2018 21:47 –
Essential Skills for a Successful IT Career
Written by Mike Meyers, the leading expert on CompTIA certification and training, this up-to-date, full-color text will prepare you for CompTIA Network+ exam N10-006 and help you become an expert networking technician. Fully revised for the latest CompTIA Network+ exam, including coverage of performance-based questions, the book contains helpful on-the-job tips, end-of-chapter practice questions, and hundreds of photographs and illustrations.
Continue reading “Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Fourth Edition (Exam N10-006) (Mike Meyers’ Computer Skills)”
Amazon Price: N/A (as of August 15, 2018 16:39 –
Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques will be included in both the Local and Remote Code sections of the book.
The book will be accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.
Continue reading “Writing Security Tools and Exploits”