NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Wireshark for security professionals : (Record no. 12422)

MARC details
000 -LEADER
fixed length control field 05882cam a2200757 i 4500
001 - CONTROL NUMBER
control field ocn974641928
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125540.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu|||unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170306s2017 inu o 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2016946245
040 ## - CATALOGING SOURCE
Original cataloging agency N$T
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency N$T
Modifying agency DG1
-- IDEBK
-- N$T
-- YDX
-- NLE
-- OCLCF
-- RECBK
-- UMI
-- TEFOD
-- COO
-- UPM
-- OTZ
-- OCLCQ
-- CNCGM
-- OCLCA
-- DEBSZ
-- OCLCQ
-- DEBBG
-- OCLCQ
-- KSU
-- WYU
-- U3W
-- OCLCQ
-- UKAHL
-- VT2
-- OCLCO
-- OCLCQ
-- OCLCO
-- OCLCL
-- OCLCQ
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB509462
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 017019879
Source Uk
019 ## -
-- 974739506
-- 974967845
-- 975013473
-- 975043978
-- 975136303
-- 981256520
-- 1138975424
-- 1228548854
-- 1244447800
-- 1249251093
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118918227
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118918223
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119183457
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119183456
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118918231
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118918234
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781118918210
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1118918215
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000061503422
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHBIS
System control number 011081492
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHNEW
System control number 000948359
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHVBK
System control number 483028339
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 491139713
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000066757583
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)974641928
Canceled/invalid control number (OCoLC)974739506
-- (OCoLC)974967845
-- (OCoLC)975013473
-- (OCoLC)975043978
-- (OCoLC)975136303
-- (OCoLC)981256520
-- (OCoLC)1138975424
-- (OCoLC)1228548854
-- (OCoLC)1244447800
-- (OCoLC)1249251093
037 ## - SOURCE OF ACQUISITION
Stock number 997866
Source of stock number/acquisition MIL
037 ## - SOURCE OF ACQUISITION
Stock number 75547547-D81D-4337-8D9D-0D91BA062801
Source of stock number/acquisition OverDrive, Inc.
Note http://www.overdrive.com
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Bullock, Jessey,
Relator term author.
245 10 - TITLE STATEMENT
Title Wireshark for security professionals :
Remainder of title using Wireshark and the Metasploit Framework /
Statement of responsibility, etc. Jessey Bullock, Jeff T. Parker.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis, IN :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice 2017.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
500 ## - GENERAL NOTE
General note Includes index.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from PDF title page (John Wiley, viewed March 15, 2017).
520 ## - SUMMARY, ETC.
Summary, etc. Master Wireshark to solve real-world security problems If you don't already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark's features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book's final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: -Master the basics of Wireshark -Explore the virtual w4sp-lab environment that mimics a real-world network -Gain experience using the Debian-based Kali OS among other systems -Understand the technical details behind network attacks -Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark -Employ Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introducing Wireshark -- Setting Up the Lab -- The Fundamentals -- Capturing Packets -- Diagnosing Attacks -- Offensive Wireshark -- Decrypting TLS, Capturing USB, Keyloggers, and Network Graphing -- Scripting with Lua.
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element S�ecurit�e informatique.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Security
-- General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Source of heading or term fast
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Gordon, Adam,
Relator term author.
758 ## - RESOURCE IDENTIFIER
Relationship information has work:
Label Wireshark for security professionals (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCH4q6y69vGpG8TmwkQkftq
Relationship https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 1118918215
-- 9781118918210
Record control number (OCoLC)885014953
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a>
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH27098719
938 ## -
-- EBSCOhost
-- EBSC
-- 1479899
938 ## -
-- ProQuest MyiLibrary Digital eBook Collection
-- IDEB
-- cis29652490
938 ## -
-- Recorded Books, LLC
-- RECE
-- rbeEB00702207
938 ## -
-- YBP Library Services
-- YANK
-- 13706302
938 ## -
-- YBP Library Services
-- YANK
-- 13530996
938 ## -
-- YBP Library Services
-- YANK
-- 13532624
994 ## -
-- 92
-- INLUM

No items available.