Chapter 1: Getting Started with Wireshark – What, Why,and How?
Chapter 2: Tweaking Wireshark
Chapter 3: Analyzing Threats to LAN Security
Chapter 4: Probing E-mail Communications
Chapter 5: Inspecting Malware Traffic
Chapter 6: Network Performance Analysis