Wireshark and Ethereal Network Protocol Analyzer Toolkit

Annotation

Permalink: http://skupnikatalog.nsk.hr/Record/fer.KOHA-OAI-FER:37603/Details
Matična publikacija: Referex Security and Networking
Vrsta građe: e-knjiga
Jezik: eng
Impresum: San Diego : Syngress Press [Imprint] Elsevier Science & Technology Books, Jan. 2007
Nakladnička cjelina: Jay Beale's Open Source Security Ser.
Online pristup: Full text available from Referex Security and Networking
LEADER 03255cam a22003732 b4500
005 20130713153612.0
006 m d
007 cr n
008 051222e20070131moua s|||||||| 2|eng|d
020 |a 9781597490733 
020 |a 1597490733 (Trade Paper)  |c USD 49.95 Retail Price (Publisher) 
024 1 |a 792502907337 
024 3 |a 9781597490733 
035 |a (WaSeSS)ssj0000272686 
037 |b 00991439 
040 |a BIP US  |d WaSeSS  |b hrv  |c HR-ZaFER  |e ppiak 
100 1 |a Orebaugh, Angela  |e Author 
210 1 0 |a Wireshark and Ethereal Network Protocol Analyzer Toolkit 
245 1 0 |a Wireshark and Ethereal Network Protocol Analyzer Toolkit  |h [electronic resource] 
260 |b Syngress Press [Imprint]  |c Jan. 2007  |a San Diego :   |b Elsevier Science & Technology Books 
300 |a xxi, 540 str.  |b ilustr.  |c 26 cm  |e +CD 
440 0 |a Jay Beale's Open Source Security Ser. 
506 |a License restrictions may limit access. 
520 8 |a Annotation  |b Ethereal is the #2 most popular open source security tool used by system administrators and security professionals. This all new book builds on the success of Syngress' best-selling book Ethereal Packet Sniffing.This book provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows, Unix or Mac OS X networks. First, readers will learn about the types of sniffers available today and see the benefits of using Ethereal. Readers will then learn to install Ethereal in multiple environments including Windows, Unix and Mac OS X as well as building Ethereal from source and will also be guided through Ethereal's graphical user interface. The following sections will teach readers to use command-line options of Ethereal as well as using Tethereal to capture live packets from the wire or to read saved capture files. This section also details how to import and export files between Ethereal and WinDump, Snort, Snoop, Microsoft Network Monitor, and EtherPeek. The book then teaches the reader to master advanced tasks such as creating sub-trees, displaying bitfields in a graphical view, tracking requests and reply packet pairs as well as exclusive coverage of MATE, Ethereal's brand new configurable upper level analysis engine. The final section to the book teaches readers to enable Ethereal to read new Data sources, program their own protocol dissectors, and to create and customize Ethereal reports.Ethereal is the #2 most popular open source security tool, according to a recent study conducted by insecure.orgSyngress' first Ethereal book has consistently been one of the best selling security books for the past 2 yearsThe companion Web site for the book provides readers with dozens of open source security tools and working scripts 
521 |a Scholarly & Professional  |b Elsevier Science & Technology Books 
700 1 |a Ramirez, Gilbert  |e Author 
700 1 |a Burke, Josh  |e Author 
700 1 |a Pesce, Larry  |e Author 
700 1 |a Beale, Jay  |e Author 
773 0 |t Referex Security and Networking 
856 4 0 |u http://www.columbia.edu/cgi-bin/cul/resolve?clio7700810  |z Full text available from Referex Security and Networking 
910 |a Bowker Global Books in Print record 
942 |2 udc  |c K 
999 |c 37603  |d 37603