| Wireshark For Security Professionals (Wiley) |
| Monday, 27 March 2017 | |||
|
Covers Wireshark and related tools such as the command line TShark application, the offensive tool Metasploit, and the Lua scripting language. Authors J. D. Bullock and Jeff T. Parker show you how Wireshark is used in an actual network with the provided Docker virtual environment, and basic networking and security principles are explained in detail to help you understand the why along with the how. <ASIN:1118918215> Using the Kali Linux penetration testing distribution in combination with the virtual lab and provided network captures, you can follow along with the numerous examples. You're also shown how to exploit and expand Wireshark's full functionality by extending Wireshark or integrating it with other security tools. Authors: J. D. Bullock and Jeff T. Parker
Follow @bookwatchiprog on Twitter or subscribe to I Programmer's Books RSS feed for each day's new addition to Book Watch and for new reviews. To have new titles included in Book Watch contact BookWatch@i-programmer.info
|
