Vendeur : Dream Books Co., Denver, CO, Etats-Unis
EUR 4,08
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : acceptable. This copy has clearly been enjoyedâ"expect noticeable shelf wear and some minor creases to the cover. Binding is strong, and all pages are legible. May contain previous library markings or stamps.
Vendeur : Once Upon A Time Books, Siloam Springs, AR, Etats-Unis
EUR 2,52
Quantité disponible : 1 disponible(s)
Ajouter au panierpaperback. Etat : Good. This is a used book in good condition and may show some signs of use or wear . This is a used book in good condition and may show some signs of use or wear .
Vendeur : ThriftBooks-Atlanta, AUSTELL, GA, Etats-Unis
EUR 6,02
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Vendeur : ThriftBooks-Dallas, Dallas, TX, Etats-Unis
EUR 6,02
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Vendeur : ThriftBooks-Dallas, Dallas, TX, Etats-Unis
EUR 6,02
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Very Good. No Jacket. Former library book; May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Langue: anglais
Edité par Wiley & Sons, Incorporated, John, 2017
ISBN 10 : 1118918215 ISBN 13 : 9781118918210
Vendeur : Better World Books, Mishawaka, IN, Etats-Unis
Edition originale
EUR 6,59
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : Good. 1st Edition. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages.
Vendeur : HPB-Red, Dallas, TX, Etats-Unis
EUR 4,38
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Acceptable. Connecting readers with great books since 1972. Used textbooks may not include companion materials such as access codes, etc. May have condition issues including wear and notes/highlighting. We ship orders daily and Customer Service is our top priority!
Vendeur : HPB-Red, Dallas, TX, Etats-Unis
EUR 4,38
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Vendeur : Friends of Pima County Public Library, Tucson, AZ, Etats-Unis
EUR 5,92
Quantité disponible : 1 disponible(s)
Ajouter au panierpaperback. Etat : Very Good. Paperback. NOT Ex-library. Very good condition. Slight edgewear and bumping. Clean pages and tight binding. Until further notice, USPS Priority Mail only reliable option for Hawaii. Proceeds benefit the Pima County Public Library system, which serves Tucson and southern Arizona.
Vendeur : Toscana Books, AUSTIN, TX, Etats-Unis
EUR 25,50
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 33,91
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : Lakeside Books, Benton Harbor, MI, Etats-Unis
EUR 32,74
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!
Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis
EUR 35,54
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 37,43
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : California Books, Miami, FL, Etats-Unis
EUR 40,27
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Langue: anglais
Edité par John Wiley & Sons Inc, New York, 2017
ISBN 10 : 1118918215 ISBN 13 : 9781118918210
Vendeur : Grand Eagle Retail, Bensenville, IL, Etats-Unis
Edition originale
EUR 43,74
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Paperback. Master Wireshark to solve real-world security problems If you dont already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wiresharks features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The books final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: Master the basics of WiresharkExplore the virtual w4sp-lab environment that mimics a real-world networkGain experience using the Debian-based Kali OS among other systemsUnderstand the technical details behind network attacksExecute exploitation and grasp offensive and defensive activities, exploring them through WiresharkEmploy Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark. Master Wireshark to solve real-world security problems If you don t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Vendeur : BargainBookStores, Grand Rapids, MI, Etats-Unis
EUR 53,06
Quantité disponible : 5 disponible(s)
Ajouter au panierPaperback or Softback. Etat : New. Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework. Book.
EUR 46,71
Quantité disponible : 3 disponible(s)
Ajouter au panierEtat : New. pp. 408.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 40,80
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 40,57
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
EUR 54,53
Quantité disponible : 3 disponible(s)
Ajouter au panierEtat : New. pp. 408.
Vendeur : THE SAINT BOOKSTORE, Southport, Royaume-Uni
EUR 40,58
Quantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback / softback. Etat : New. New copy - Usually dispatched within 4 working days.
Vendeur : Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlande
Edition originale
EUR 48,07
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Master Wireshark to solve real-world security problems If you don t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. Num Pages: 288 pages. BIC Classification: UR; UTN. Category: (P) Professional & Vocational. Dimension: 250 x 150 x 15. Weight in Grams: 666. . 2017. 1st Edition. Paperback. . . . .
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 44,14
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : Kennys Bookstore, Olney, MD, Etats-Unis
EUR 58,77
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Master Wireshark to solve real-world security problems If you don t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. Num Pages: 288 pages. BIC Classification: UR; UTN. Category: (P) Professional & Vocational. Dimension: 250 x 150 x 15. Weight in Grams: 666. . 2017. 1st Edition. Paperback. . . . . Books ship from the US and Ireland.
Vendeur : Revaluation Books, Exeter, Royaume-Uni
EUR 54,02
Quantité disponible : 2 disponible(s)
Ajouter au panierPaperback. Etat : Brand New. 408 pages. 9.50x7.50x0.50 inches. In Stock.
Langue: anglais
Edité par John Wiley & Sons Inc, New York, 2017
ISBN 10 : 1118918215 ISBN 13 : 9781118918210
Vendeur : CitiRetail, Stevenage, Royaume-Uni
Edition originale
EUR 42,44
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Paperback. Master Wireshark to solve real-world security problems If you dont already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wiresharks features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The books final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: Master the basics of WiresharkExplore the virtual w4sp-lab environment that mimics a real-world networkGain experience using the Debian-based Kali OS among other systemsUnderstand the technical details behind network attacksExecute exploitation and grasp offensive and defensive activities, exploring them through WiresharkEmploy Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark. Master Wireshark to solve real-world security problems If you don t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
EUR 42,24
Quantité disponible : 1 disponible(s)
Ajouter au panierKartoniert / Broschiert. Etat : New. Master Wireshark to solve real-world security problemsIf you don t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issu.
Langue: anglais
Edité par John Wiley & Sons Inc, New York, 2017
ISBN 10 : 1118918215 ISBN 13 : 9781118918210
Vendeur : AussieBookSeller, Truganina, VIC, Australie
Edition originale
EUR 65,89
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Paperback. Master Wireshark to solve real-world security problems If you dont already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wiresharks features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The books final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: Master the basics of WiresharkExplore the virtual w4sp-lab environment that mimics a real-world networkGain experience using the Debian-based Kali OS among other systemsUnderstand the technical details behind network attacksExecute exploitation and grasp offensive and defensive activities, exploring them through WiresharkEmploy Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark. Master Wireshark to solve real-world security problems If you don t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 52,42
Quantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware - Master Wireshark to solve real-world security problemsIf you don't already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment.Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples.Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material.Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark's features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book's final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark.By the end of the book you will gain the following:\* Master the basics of Wireshark\* Explore the virtual w4sp-lab environment that mimics a real-world network\* Gain experience using the Debian-based Kali OS among other systems\* Understand the technical details behind network attacks\* Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark\* Employ Lua to extend Wireshark features and create useful scriptsTo sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark.