Poznań

 

 
 

TWÓJ KOSZYK

W twoim koszyku jest 1 produkt,
łącznie za kwotę 72,00 zł
OSTATNIO DODANY PRODUKT :
The Collected Supernatural and Weird Fiction of Violet Hunt
Hunt Violet
72,00 zł

 
ksiazka tytuł: Ethical Hacking and Network Analysis with Wireshark autor: Sharma Manish
DOSTAWA WYŁĄCZNIE NA TERYTORIUM POLSKI

FORMY I KOSZTY DOSTAWY
  • 0,00 zł
  • 0,00 zł
  • 9,50 zł
  • 12,50 zł
  • 0,00 zł
  • Od 9,90 zł
  • Od 11,00 zł
  • 0,00 zł
  • Od 6,90
  • Od 9,90

Ethical Hacking and Network Analysis with Wireshark

Exploration of network packets for detecting exploits and malware (English Edition)
Wersja papierowa
Wydawnictwo: BPB Publications
ISBN: 978-93-555-1772-2
Format: 19.1x23.5cm
Liczba stron: 404
Oprawa: Miękka
Wydanie: 2024 r.
Język: angielski

Dostępność: dostępny
203,70 zł

<p><strong style="color: rgba(34, 34, 34, 1)">Wireshark: A hacker's guide to network insights</strong></p><p><br></p><p><strong style="color: rgba(0, 0, 0, 1); background-color: rgba(0, 0, 0, 0)"><span></span>DESCRIPTION&nbsp;</strong></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Ethical Hacking and Network Analysis with Wireshark provides you with the tools and expertise to demystify the invisible conversations coursing through your cables. This definitive guide, meticulously allows you to leverage the industry-leading Wireshark to gain an unparalleled perspective on your digital landscape.</span></p><p><br></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">This book teaches foundational protocols like TCP/IP, SSL/TLS and SNMP, explaining how data silently traverses the digital frontier. With each chapter, Wireshark transforms from a formidable tool into an intuitive extension of your analytical skills. Discover lurking vulnerabilities before they morph into full-blown cyberattacks.</span></p><p><br></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Dissect network threats like a forensic scientist and wield Wireshark to trace the digital pulse of your network, identifying and resolving performance bottlenecks with precision. Restructure your network for optimal efficiency, banish sluggish connections and lag to the digital scrapheap.</span></p><p><br></p><p><strong style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">WHAT YOU WILL LEARN</strong></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Navigate and utilize Wireshark for effective network analysis.</span></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Identify and address potential network security threats.</span></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Hands-on data analysis: Gain practical skills through real-world exercises.</span></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Improve network efficiency based on insightful analysis and optimize network performance.</span></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Troubleshoot and resolve protocol and connectivity problems with confidence.</span></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Develop expertise in safeguarding systems against potential vulnerabilities.</span></p><p><br></p><p><strong style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">WHO THIS BOOK IS FOR</strong></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Whether you are a network/system administrators, network security engineers, security defender, QA engineers, ethical hackers or cybersecurity aspirants. This book helps you to see the invisible and understand the digital chatter that surrounds you.</span></p><p><br></p><p><br></p><p><br></p><p><br></p>

 

Newsletter

Newsletter
Zapisz Wypisz

Klikając "Zapisz" zgadzasz się na przesyłanie na udostępniony adres e-mail informacji handlowych, tj. zwłaszcza o ofertach, promocjach w formie dedykowanego newslettera.

Płatności

Kanały płatności

Księgarnia PWN Poznań akceptuje płatności:

  • płatność elektroniczna eCard (karta płatnicza, ePrzelew)
  • za pobraniem - przy odbiorze przesyłki należność pobiera listonosz lub kurier