Network Forensics /
"Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way--by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log...
Main Author: | |
---|---|
Format: | |
Language: | eng |
Published: |
Indianapolis, IN : Wiley,
2017
|
Subjects: |
_version_ | 1826466264035360768 |
---|---|
author | Messier, Ric, author |
author_facet | Messier, Ric, author |
author_sort | Messier, Ric, author |
collection | OCEAN |
description | "Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way--by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn-by-doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log analysis and beyond, this book emphasizes the critical techniques that bring evidence to light" |
first_indexed | 2024-03-05T15:46:23Z |
format | |
id | KOHA-OAI-TEST:545112 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T15:46:23Z |
publishDate | 2017 |
publisher | Indianapolis, IN : Wiley, |
record_format | dspace |
spelling | KOHA-OAI-TEST:5451122020-12-19T17:20:36ZNetwork Forensics / Messier, Ric, author Indianapolis, IN : Wiley,♭20172017eng"Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way--by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn-by-doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log analysis and beyond, this book emphasizes the critical techniques that bring evidence to light"Introduction to network forensics -- Networking basics -- Host-side artifacts -- Packet capture and analysis -- Attack types -- Location awareness -- Preparing for attacks -- Intrusion detection systems -- Using firewall and application logs -- Correlating attacks -- Network scanning -- Final considerations"Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way--by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn-by-doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log analysis and beyond, this book emphasizes the critical techniques that bring evidence to light"PSZJBLComputer networksInternetURN:ISBN:9781119328285 |
spellingShingle | Computer networks Internet Messier, Ric, author Network Forensics / |
title | Network Forensics / |
title_full | Network Forensics / |
title_fullStr | Network Forensics / |
title_full_unstemmed | Network Forensics / |
title_short | Network Forensics / |
title_sort | network forensics |
topic | Computer networks Internet |
work_keys_str_mv | AT messierricauthor networkforensics |