Table of Contents
- Getting Started with Wireshark - What, Why, and How?
- Tweaking Wireshark
- Analyzing Threats to LAN Security
- Probing an Email Conversation
- Inspecting IRC Communications
- Analyzing Network Performance Issues

A succinct guide to securely administer your network using Wireshark