Mastering Wireshark 2 develop skills for network analysis and address a wide range of information security threats
Annotation
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK
Packt Publishing
2018
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047717734 | ||
003 | DE-627-1 | ||
005 | 20240228120524.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
020 | |a 9781788621366 |c electronic bk. |9 978-1-78862-136-6 | ||
020 | |a 1788621360 |c electronic bk. |9 1-78862-136-0 | ||
020 | |a 1788626524 |9 1-78862-652-4 | ||
020 | |a 9781788626521 |9 978-1-78862-652-1 | ||
035 | |a (DE-627-1)047717734 | ||
035 | |a (DE-599)KEP047717734 | ||
035 | |a (ORHE)9781788626521 | ||
035 | |a (DE-627-1)047717734 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 004.66 |2 23 | |
100 | 1 | |a Crouthamel, Andrew |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Mastering Wireshark 2 |b develop skills for network analysis and address a wide range of information security threats |c Andrew Crouthamel |
264 | 1 | |a Birmingham, UK |b Packt Publishing |c 2018 | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title page (Safari, viewed June 27, 2018) | ||
520 | |a Annotation | ||
650 | 0 | |a Computer network protocols | |
650 | 0 | |a Packet switching (Data transmission) | |
650 | 0 | |a Computer networks |x Monitoring | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Packet transport networks | |
650 | 4 | |a Protocoles de réseaux d'ordinateurs | |
650 | 4 | |a Commutation de paquets | |
650 | 4 | |a Réseaux d'ordinateurs ; Surveillance | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Computer Literacy | |
650 | 4 | |a COMPUTERS ; Computer Science | |
650 | 4 | |a COMPUTERS ; Data Processing | |
650 | 4 | |a COMPUTERS ; Hardware ; General | |
650 | 4 | |a COMPUTERS ; Information Technology | |
650 | 4 | |a COMPUTERS ; Machine Theory | |
650 | 4 | |a COMPUTERS ; Reference | |
650 | 4 | |a Computer network protocols | |
650 | 4 | |a Computer networks ; Monitoring | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Packet switching (Data transmission) | |
650 | 4 | |a Packet transport networks | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781788626521/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047717734 |
---|---|
_version_ | 1818767293620944896 |
adam_text | |
any_adam_object | |
author | Crouthamel, Andrew |
author_facet | Crouthamel, Andrew |
author_role | aut |
author_sort | Crouthamel, Andrew |
author_variant | a c ac |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047717734 (DE-599)KEP047717734 (ORHE)9781788626521 |
dewey-full | 004.66 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.66 |
dewey-search | 004.66 |
dewey-sort | 14.66 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02582cam a22007092 4500</leader><controlfield tag="001">ZDB-30-ORH-047717734</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120524.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788621366</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78862-136-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788621360</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-78862-136-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788626524</subfield><subfield code="9">1-78862-652-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788626521</subfield><subfield code="9">978-1-78862-652-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047717734</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047717734</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781788626521</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047717734</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.66</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Crouthamel, Andrew</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mastering Wireshark 2</subfield><subfield code="b">develop skills for network analysis and address a wide range of information security threats</subfield><subfield code="c">Andrew Crouthamel</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title page (Safari, viewed June 27, 2018)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Annotation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer network protocols</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Packet switching (Data transmission)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Monitoring</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Packet transport networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protocoles de réseaux d'ordinateurs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Commutation de paquets</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Surveillance</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Computer Literacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Data Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Hardware ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Information Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Machine Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Reference</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network protocols</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Monitoring</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Packet switching (Data transmission)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Packet transport networks</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781788626521/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047717734 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:47:35Z |
institution | BVB |
isbn | 9781788621366 1788621360 1788626524 9781788626521 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Packt Publishing |
record_format | marc |
spelling | Crouthamel, Andrew VerfasserIn aut Mastering Wireshark 2 develop skills for network analysis and address a wide range of information security threats Andrew Crouthamel Birmingham, UK Packt Publishing 2018 1 online resource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title page (Safari, viewed June 27, 2018) Annotation Computer network protocols Packet switching (Data transmission) Computer networks Monitoring Computer networks Security measures Packet transport networks Protocoles de réseaux d'ordinateurs Commutation de paquets Réseaux d'ordinateurs ; Surveillance Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Computer networks ; Monitoring Computer networks ; Security measures TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781788626521/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Crouthamel, Andrew Mastering Wireshark 2 develop skills for network analysis and address a wide range of information security threats Computer network protocols Packet switching (Data transmission) Computer networks Monitoring Computer networks Security measures Packet transport networks Protocoles de réseaux d'ordinateurs Commutation de paquets Réseaux d'ordinateurs ; Surveillance Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Computer networks ; Monitoring Computer networks ; Security measures |
title | Mastering Wireshark 2 develop skills for network analysis and address a wide range of information security threats |
title_auth | Mastering Wireshark 2 develop skills for network analysis and address a wide range of information security threats |
title_exact_search | Mastering Wireshark 2 develop skills for network analysis and address a wide range of information security threats |
title_full | Mastering Wireshark 2 develop skills for network analysis and address a wide range of information security threats Andrew Crouthamel |
title_fullStr | Mastering Wireshark 2 develop skills for network analysis and address a wide range of information security threats Andrew Crouthamel |
title_full_unstemmed | Mastering Wireshark 2 develop skills for network analysis and address a wide range of information security threats Andrew Crouthamel |
title_short | Mastering Wireshark 2 |
title_sort | mastering wireshark 2 develop skills for network analysis and address a wide range of information security threats |
title_sub | develop skills for network analysis and address a wide range of information security threats |
topic | Computer network protocols Packet switching (Data transmission) Computer networks Monitoring Computer networks Security measures Packet transport networks Protocoles de réseaux d'ordinateurs Commutation de paquets Réseaux d'ordinateurs ; Surveillance Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Computer networks ; Monitoring Computer networks ; Security measures |
topic_facet | Computer network protocols Packet switching (Data transmission) Computer networks Monitoring Computer networks Security measures Packet transport networks Protocoles de réseaux d'ordinateurs Commutation de paquets Réseaux d'ordinateurs ; Surveillance Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Computer networks ; Monitoring Computer networks ; Security measures |
url | https://learning.oreilly.com/library/view/-/9781788626521/?ar |
work_keys_str_mv | AT crouthamelandrew masteringwireshark2developskillsfornetworkanalysisandaddressawiderangeofinformationsecuritythreats |