Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
If you are a network administrator, system administrator, information security, or forensics professional and wish to learn network forensic to track the intrusions through network-based evidence, then this book is for you. Basic knowledge of Linux and networking concepts is expected.
We live in a highly networked world. Every digital device-phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to catch miscreants on the network.
The book starts with an introduction to the world of network forensics and investigations. You will begin by getting an understanding of how to gather both physical and virtual evidence, intercepting and analyzing network data, wireless data packets, investigating intrusions, and so on. You will further explore the technology, tools, and investigating methods using malware forensics, network tunneling, and behaviors. By the end of the book, you will gain a complete understanding of how to successfully close a case.
"synopsis" may belong to another edition of this title.
Identify and safeguard your network against both internal and external threats, hackers, and malware attacks About This Book * Lay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network traffic * Connect the dots by understanding web proxies, firewalls, and routers to close in on your suspect * A hands-on guide to help you solve your case with malware forensic methods and network behaviors Who This Book Is For If you are a network administrator, system administrator, information security, or forensics professional and wish to learn network forensic to track the intrusions through network-based evidence, then this book is for you. Basic knowledge of Linux and networking concepts is expected. What You Will Learn * Understand Internetworking, sources of network-based evidence and other basic technical fundamentals, including the tools that will be used throughout the book * Acquire evidence using traffic acquisition software and know how to manage and handle the evidence * Perform packet analysis by capturing and collecting data, along with content analysis * Locate wireless devices, as well as capturing and analyzing wireless traffic data packets * Implement protocol analysis and content matching; acquire evidence from NIDS/NIPS * Act upon the data and evidence gathered by being able to connect the dots and draw links between various events * Apply logging and interfaces, along with analyzing web proxies and understanding encrypted web traffic * Use IOCs (Indicators of Compromise) and build real-world forensic solutions, dealing with malware In Detail We live in a highly networked world. Every digital device-phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to catch miscrea
Samir Datt
Samir Datt has been dabbling with digital investigations since 1988, which was around the time he solved his first case with the help of an old PC and Lotus 123. He is the Founder CEO of Foundation Futuristic Technologies (P) Ltd, better known as ForensicsGuru.com. He is widely credited with evangelizing computer forensics in the Indian subcontinent and has personally trained thousands of law enforcement officers in the area. He has the distinction of starting the computer forensics industry in South Asia and setting up India's first computer forensic lab in the private sector. He is consulted by law enforcement agencies and private sector on various technology-related investigative issues. He has extensive experience in training thousands of investigators as well as examining a large number of digital sources of evidence in both private and government investigations.
"About this title" may belong to another edition of this title.
£ 42.62 shipping from U.S.A. to United Kingdom
Destination, rates & speedsSeller: Chiron Media, Wallingford, United Kingdom
PF. Condition: New. Seller Inventory # 6666-IUK-9781782174905
Quantity: 10 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9781782174905_new
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9781782174905
Quantity: Over 20 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 526. Seller Inventory # C9781782174905
Quantity: Over 20 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand pp. 274. Seller Inventory # 371410268
Quantity: 4 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 274. Seller Inventory # 26374667907
Quantity: 4 available
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. PRINT ON DEMAND pp. 274. Seller Inventory # 18374667913
Quantity: 4 available
Seller: Miki Store, San Jose, CA, U.S.A.
paperback. Condition: Good. Pages are crisp and clean, no marking. Cover is good. Binding is tight/good. Seller Inventory # pc-bs21
Quantity: 1 available
Seller: moluna, Greven, Germany
Kartoniert / Broschiert. Condition: New. Seller Inventory # 448313132
Quantity: Over 20 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering. Seller Inventory # 9781782174905
Quantity: 1 available