Hacking Network Protocols: Unlocking the Secrets of Network Protocol Analysis
(eBook)
Description
Also in this Series
More Copies In Prospector
More Details
Reviews from GoodReads
Citations
Tom Lesley., & Tom Lesley|AUTHOR. (2024). Hacking Network Protocols: Unlocking the Secrets of Network Protocol Analysis . May Reads.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Tom Lesley and Tom Lesley|AUTHOR. 2024. Hacking Network Protocols: Unlocking the Secrets of Network Protocol Analysis. May Reads.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Tom Lesley and Tom Lesley|AUTHOR. Hacking Network Protocols: Unlocking the Secrets of Network Protocol Analysis May Reads, 2024.
MLA Citation, 9th Edition (style guide)Tom Lesley, and Tom Lesley|AUTHOR. Hacking Network Protocols: Unlocking the Secrets of Network Protocol Analysis May Reads, 2024.
Staff View
Grouping Information
Grouped Work ID | 593a2fd7-c5b3-bf64-f00c-30c1efc910e0-eng |
---|---|
Full title | hacking network protocols unlocking the secrets of network protocol analysis |
Author | lesley tom |
Grouping Category | book |
Last Update | 2024-05-14 23:01:35PM |
Last Indexed | 2024-06-01 02:34:33AM |
Hoopla Extract Information
stdClass Object ( [year] => 2024 [artist] => Tom Lesley [fiction] => [coverImageUrl] => https://cover.hoopladigital.com/dra_9798224511259_270.jpeg [titleId] => 16862593 [isbn] => 9798224511259 [abridged] => [language] => ENGLISH [profanity] => [title] => Hacking Network Protocols: Unlocking the Secrets of Network Protocol Analysis [demo] => [segments] => Array ( ) [pages] => 132 [children] => [artists] => Array ( [0] => stdClass Object ( [name] => Tom Lesley [artistFormal] => Lesley, Tom [relationship] => AUTHOR ) ) [genres] => Array ( [0] => Computers [1] => Network Security [2] => Security [3] => Viruses & Malware ) [price] => 1.05 [id] => 16862593 [edited] => [kind] => EBOOK [active] => 1 [upc] => [synopsis] => Hacking Network Protocols: Unlocking the Secrets of Network Protocol Analysis" is a comprehensive guide to understanding the vulnerabilities and defenses of network protocols. In today's interconnected world, networks are essential for communication and collaboration, making them a prime target for hackers seeking to exploit vulnerabilities in the protocols that underpin them. This book provides a detailed overview of network protocols, including commonly used protocols such as TCP/IP, HTTP, DNS, SMTP, and FTP. It covers network protocol analysis techniques, such as sniffing, traffic analysis, and packet inspection, as well as Wireshark and other popular network protocol analysis tools."Hacking Network Protocols" also delves into the world of network protocol hacking and exploitation techniques, exploring common attack vectors such as TCP/IP hijacking, DNS spoofing, and ARP poisoning. The book also covers network protocol defense techniques, such as firewalls, intrusion detection systems, and encryption, and provides techniques for detecting and mitigating network protocol attacks. Written in a clear and concise style, "Hacking Network Protocols" is suitable for both novice and experienced readers. It is an essential guide for network administrators, security professionals, and anyone interested in network security and hacking. With this book as a guide, readers will gain a deeper understanding of network protocols and the security challenges they present, allowing them to defend against attacks and protect their networks from intrusion. [url] => https://www.hoopladigital.com/title/16862593 [pa] => [publisher] => May Reads [purchaseModel] => INSTANT )