Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Packet Filtering: Catching the Cool Packets

Buy

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than port numbers . Also includes step-by-step instructions for checking for Gnutella, Morpheus, and iMesh traffic regardless of the port the users/servers are using! This book includes step-by-step instructions for importing sample filters into EtherPeek and Sniffer.

About the Author

Laura Chappell, Sr. Protocol Analyst, is a highly-energetic speaker and author who has trained thousands of LAN/WAN administrators, engineers, technicians and developers. She admittedly ‘lives, eats and breathes’ packets and packet-level communications. She analyzes and documents network performance by providing onsite and offsite network analysis, troubleshooting and optimization services. Her international client base ranges from governments to health care to financial/banking institutions.

Ms. Chappell is the author of “Introduction to Network Analysis,” “Advanced Network Analysis,” “TCP/IP Analysis and Troubleshooting” (podbooks.com), “Novell’s Guide to LAN/WAN Analysis: IPX/SPX,” “Novell’s Guide to Internet Access Solutions,” and “Novell’s Guide to Multiprotocol Internetworking” (Novell Press/IDG Books/Sybex Books). Ms. Chappell has also edited three Cisco Press titles, “Introduction to Cisco Router Configuration,” “Advanced Cisco Router Configuration,” and “Cisco Internetwork Troubleshooting” (Cisco Press/Macmillan Technical Publishing).

(HTML tags aren't allowed.)

Beginning Linux Programming
Beginning Linux Programming
Building on the success of its previous editions, this must-have guide continues its popular tutorial approach and brings you a straightforward introduction to developing programs for Linux and other UNIX-style operating systems. The author duo of experienced Linux programmers covers a wide range of topics to help you learn more about what Linux...
Taking Your iPod touch to the Max
Taking Your iPod touch to the Max

Unleash your iPod touch and take it to the limit using secret tips and techniques from gadget hacker Erica Sadun. Fast and fun to read, Taking Your iPod touch to the Max will help you get the most out of your iPod touch.

You’ll find all the best undocumented tricks as well as the most efficient and enjoyable
...

How to Do Everything with Adobe® Acrobat® 6.0 (Windows)
How to Do Everything with Adobe® Acrobat® 6.0 (Windows)

Harness the power of Adobe Acrobat to create and publish sophisticated PDF (Portable Document Format) documents. From simple memos to interactive forms, learn why Acrobat is the tool for any electronic publishing task--including projects that require multimedia. Create, enhance, and edit PDF documents, or use the Internet to share working PDF...


Adaptive Filters Theory and Applications
Adaptive Filters Theory and Applications

Adaptive filtering is an advanced and growing field in signal processing. A filter is a transmission network used in electronic circuits for the selective enhancement or reduction of specified components of an input signal. Filtering is achieved by selectively attenuating those components of the input signal which are undesired, relative to...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Bridging the Culture Gap: A Practical Guide to International Business Communication
Bridging the Culture Gap: A Practical Guide to International Business Communication

As globalization gathers momentum, contact between business people from other countries is becoming more frequent. The more national boundaries a company crosses, the greater the scope for misunderstanding and conflict. To succeed internationally, it is essential to be able to break the barriers of culture, language, and set patterns of...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy