The KCAU Library

Wireshark for security professionals : (Record no. 17031)

MARC details
000 -LEADER
fixed length control field 03885cam a22004337i 4500
001 - CONTROL NUMBER
control field 19156171
003 - CONTROL NUMBER IDENTIFIER
control field KE-NaKCAU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190725155339.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160628t20172017inua 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2016946245
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB509462
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 017019879
Source Uk
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118918210
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn885014953
040 ## - CATALOGING SOURCE
Original cataloging agency YDXCP
Language of cataloging eng
Transcribing agency KE-NaKCAU
Modifying agency SINLB
Description conventions rda
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number B865 2017
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Bullock, Jessey,
Relator term author.
245 10 - TITLE STATEMENT
Title Wireshark for security professionals :
Remainder of title using Wireshark and the Metasploit framework /
Statement of responsibility, etc Jessey Bullock, Jeff T. Parker.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Canada :
Name of publisher, distributor, etc John Wiley and Sons, Inc.,
Date of publication, distribution, etc 2017.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 272 pages :
Other physical details illustrations ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Includes index.
520 ## - SUMMARY, ETC.
Summary, etc Master Wireshark to solve real-world security problems If you don't already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark's features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book's final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: -Master the basics of Wireshark -Explore the virtual w4sp-lab environment that mimics a real-world network -Gain experience using the Debian-based Kali OS among other systems -Understand the technical details behind network attacks -Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark -Employ Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark.
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title Metasploit (Electronic resource)
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title Kali Linux.
630 07 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title Kali Linux.
Source of heading or term fast
630 07 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title Metasploit (Electronic resource)
Source of heading or term fast
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 458
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Penetration testing (Computer security)
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
Source of heading or term fast
9 (RLIN) 458
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Penetration testing (Computer security)
Source of heading or term fast
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Parker, Jeff T.,
Relator term author.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e ncip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Serial Enumeration / chronology Inventory number Total Checkouts Total Renewals Full call number Barcode Date last seen Date checked out Cost, replacement price Price effective from Koha item type
    Library of Congress Classification     Non-fiction Martin Oduor-Otieno Library Martin Oduor-Otieno Library This item is located on the library Second Floor 19/07/2019 Regent 4408.00 29965/19 29965/19 3 3 QA76.9.A25 B865 2017 MOOL19070187 11/10/2022 27/09/2022 4408.00 19/07/2019 Main Long
KCAU Library,
KCA University ,
Thika Road Ruaraka
P. O. Box 56808 – 00200 Nairobi, Kenya

More Links

Powered by Koha