logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Wireshark For Security Professionals Using Wireshark And The Metasploit Framework Jessey Bullock

  • SKU: BELL-50194458
Wireshark For Security Professionals Using Wireshark And The Metasploit Framework Jessey Bullock
$ 31.00 $ 45.00 (-31%)

5.0

40 reviews

Wireshark For Security Professionals Using Wireshark And The Metasploit Framework Jessey Bullock instant download after payment.

Publisher: Wiley
File Extension: PDF
File size: 13.06 MB
Pages: 288
Author: Jessey Bullock, Jeff T. Parker
ISBN: 9781118918210, 1118918215
Language: English
Year: 2017

Product desciption

Wireshark For Security Professionals Using Wireshark And The Metasploit Framework Jessey Bullock by Jessey Bullock, Jeff T. Parker 9781118918210, 1118918215 instant download after payment.

Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark’s features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book’s final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark.

Related Products