Book Image

Wireshark Network Security

By : Piyush Verma
Book Image

Wireshark Network Security

By: Piyush Verma

Overview of this book

Table of Contents (14 chapters)
Wireshark Network Security
Credits
About the Author
Acknowledgment
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


In this chapter, we looked at how to create a relevant troubleshooting profile and learned how to use the TCP delta time to sort on any time latencies, as well as the IO Graph for better representation of the performance problems. The key to troubleshooting still remains an in-depth understanding of protocols because a tool can only help us sort things out, but it is our job to figure out what to look for.