Practical Packet Analysis, 3rd Edition


Book Description

It’s easy to capture packets with Wireshark, the world’s most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what’s happening on your network? Updated to cover Wireshark 2.x, the third edition of Practical Packet Analysis will teach you to make sense of your packet captures so that you can better troubleshoot network problems. You’ll find added coverage of IPv6 and SMTP, a new chapter on the powerful command line packet analyzers tcpdump and TShark, and an appendix on how to read and reference packet values using a packet map. Practical Packet Analysis will show you how to: –Monitor your network in real time and tap live network communications –Build customized capture and display filters –Use packet analysis to troubleshoot and resolve common network problems, like loss of connectivity, DNS issues, and slow speeds –Explore modern exploits and malware at the packet level –Extract files sent across a network from packet captures –Graph traffic patterns to visualize the data flowing across your network –Use advanced Wireshark features to understand confusing captures –Build statistics and reports to help you better explain technical network information to non-techies No matter what your level of experience is, Practical Packet Analysis will show you how to use Wireshark to make sense of any network and get things done.







Practical Packet Analysis, 2nd Edition


Book Description

Provides information on ways to use Wireshark to capture and analyze packets, covering such topics as building customized capture and display filters, graphing traffic patterns, and building statistics and reports.




Packet Guide to Voice over IP


Book Description

Go under the hood of an operating Voice over IP network, and build your knowledge of the protocols and architectures used by this Internet telephony technology. With this concise guide, you’ll learn about services involved in VoIP and get a first-hand view of network data packets from the time the phones boot through calls and subsequent connection teardown. With packet captures available on the companion website, this book is ideal whether you’re an instructor, student, or professional looking to boost your skill set. Each chapter includes a set of review questions, as well as practical, hands-on lab exercises. Learn the requirements for deploying packetized voice and video Understand traditional telephony concepts, including local loop, tip and ring, and T carriers Explore the Session Initiation Protocol (SIP), VoIP’s primary signaling protocol Learn the operations and fields for VoIP’s standardized RTP and RTCP transport protocols Delve into voice and video codecs for converting analog data to digital format for transmission Get familiar with Communications Systems H.323, SIP’s widely used predecessor Examine the Skinny Client Control Protocol used in Cisco VoIP phones in networks around the world




Monthly Packet


Book Description




Packet Guide to Core Network Protocols


Book Description

Take an in-depth tour of core Internet protocols and learn how they work together to move data packets from one network to another. With this concise book, you'll delve into the aspects of each protocol, including operation basics and security risks, and learn the function of network hardware such as switches and routers. Ideal for beginning network engineers, each chapter in this book includes a set of review questions, as well as practical, hands-on lab exercises. Understand basic network architecture, and how protocols and functions fit togetherLearn the structure and operation of the Eth.







Ethical Hacking: Techniques, Tools, and Countermeasures


Book Description

"Ethical Hacking covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen-testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies the tools and methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. This title is can be aligned to EC Council's Certified Ethical Hacker in terms of scope (but not rigor)"--




Maneuvers with Nickels and Numbers, Grades 5-9


Book Description

Supplementary math instruction with computer-based, problem-solving material.




Cryptology and Network Security


Book Description