Today is a free download without charge Download

Samir Datt - Learning Network Forensics [2016, PDF, ENG]

Reply to topic

Omen ®

Longevity: 8 years 4 months

Posts: 181087


Post 22-Jun-2016 00:33


Learning Network Forensics
Год издания: 2016
Автор: Samir Datt
Издательство: Packt Publishing
ISBN: 9781782174905
Язык: Английский
Формат: PDF
Качество: Издательский макет или текст (eBook)
Интерактивное оглавление: Да
Количество страниц: 274
Описание: We live in a highly networked world. Every digital device—phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to catch miscreants on the network.
The book starts with an introduction to the world of network forensics and investigations. You will begin by getting an understanding of how to gather both physical and virtual evidence, intercepting and analyzing network data, wireless data packets, investigating intrusions, and so on. You will further explore the technology, tools, and investigating methods using malware forensics, network tunneling, and behaviors. By the end of the book, you will gain a complete understanding of how to successfully close a case.
What You Will Learn
- Understand Internet working, sources of network-based evidence and other basic technical fundamentals, including the tools that will be used throughout the book
- Acquire evidence using traffic acquisition software and know how to manage and handle the evidence
- Perform packet analysis by capturing and collecting data, along with content analysis
- Locate wireless devices, as well as capturing and analyzing wireless traffic data packets
- Implement protocol analysis and content matching; acquire evidence from NIDS/NIPS
- Act upon the data and evidence gathered by being able to connect the dots and draw links between various events
- Apply logging and interfaces, along with analyzing web proxies and understanding encrypted web traffic
- Use IOCs (Indicators of Compromise) and build real-world forensic solutions, dealing with malware

Примеры страниц


Table of Contents
1: Becoming Network 007s
2: Laying Hands on the Evidence
3: Capturing & Analyzing Data Packets
4: Going Wireless
5: Tracking an Intruder on the Network
6: Connecting the Dots – Event Logs
7: Proxies, Firewalls, and Routers
8: Smuggling Forbidden Protocols – Network Tunneling
9: Investigating Malware – Cyber Weapons of the Internet
10: Closing the Deal – Solving the Case
Other forum [Profile] [PM]
Display posts from previous:    
Reply to topic

The time now is: Today 08:35

All times are GMT + 3 Hours

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum