You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Based on over 20 years of analyzing networks and teaching key analysis skills, this Second Edition covers the key features and functions of Wireshark version 2. This book includes 46 Labs and end-of-chapter Challenges to help you master Wireshark for troubleshooting, security, optimization, application analysis, and more.
"Network analysis is the process of listening to and analyzing network traffic. Network analysis offers an insight into network communications to identify performance problems, locate security breaches, analyze application behavior, and perform capacity planning. Network analysis (aka "protocol analysis") is a process used by IT professionals who are responsible for network performance and security." -- p. 2.
This edited collection is a timely and in-depth analysis of the EU’s efforts to bring coherency and strategy to its security policy actions. Despite a special European Council summit in December 2013 on defence, it is generally acknowledged that fifteen years since its inception the EU’s Common Security and Defence Policy (CSDP) has yet to acquire a clear sense of purpose. This book investigates those areas where the EU has established actorness in the security and defence field and asks whether they might constitute the elements of an emergent more coherent EU strategy on security. Taking a critical view, the contributors map the EU’s strategic vision(s) across particular key regions ...
Contemporary European Security explores the complex European security architecture and introduces students to the empirical, theoretical and conceptual approaches to studying the subject. Written by experts in each subfield, it addresses key topics within the wider strategic context of international security. Presenting traditional and critical debates to illuminate this ever-changing field it addresses specifically: European security since 2000 and the end of the Cold War. The evolution of International Relations theories in understanding security in Europe. The role of NATO in the post-war period and its strategy, impact and enlargement. The institutionalisation of the CSCE and the politic...
Wireshark is the world's most popular network analyzer solution. Used for network troubleshooting, forensics, optimization and more, Wireshark is considered one of the most successful open source projects of all time. Laura Chappell has been involved in the Wireshark project since its infancy (when it was called Ethereal) and is considered the foremost authority on network protocol analysis and forensics using Wireshark. This book consists of 16 labs and is based on the format Laura introduced to trade show audiences over ten years ago through her highly acclaimed "Packet Challenges." This book gives you a chance to test your knowledge of Wireshark and TCP/IP communications analysis by posin...
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and...
Catholic antimodern, 1920-1929 -- Anti-communism and paternal Catholicism, 1929-1944 -- Anti-fascism and fraternal Catholicism, 1929-1944 -- Rebuilding Christian Europe, 1944-1950 -- Christian democracy and Catholic innovation in the long 1950s -- The return of heresy in the global 1960s
A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them! It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even worse. This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux. Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilit...
Filled with real-world event examples, insider tips, and essential planning, development, and troubleshooting checklists, this book is the ultimate resource for virtual event planners and hosts. Whether your virtual event is a conference, online course series, job interview day, or something else, this book offers step-by-step instructions and checklists to help. Plan, develop, and host a virtual event from start to finish Compare and host live, simulated live, or a hybrid event elements Add interactivity and promote socialization within virtual events Effectively market your online events to attendees and exhibitors/sponsors Ensure the most effective global delivery This book includes links...