Mastering Network Forensics : A practical approach to investigating and defending against network attacks /

Network forensics is a rapidly growing field with a high demand for skilled professionals. This book provides a comprehensive guide on the subject, covering everything from the fundamentals to advanced topics such as malware analysis and cyber attack investigation. Written by a seasoned expert with...

Full description

Saved in:
Bibliographic Details
Main Author: Jaswal, Nipun (Author)
Format: Book
Language:English
Published: India : BPB Publications, 2024
Edition:First Edition
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 106007
003 MY-KlNDU
005 20250522164133.0
006 a|||| |||| 001 0
007 ta
008 250521s20242024ii a|||| |||| 00| 0 eng d
020 |a 9789355516916 (pbk) 
040 |a MY-KlNDU  |b eng  |c MY-KlNDU  |e rda 
050 0 0 |a HV 8079.C65 
090 |a HV 8079.C65  |b J37 2024 
100 1 |a Jaswal, Nipun,  |e author 
245 1 0 |a Mastering Network Forensics :  |b A practical approach to investigating and defending against network attacks /  |c Nipun Jaswal 
250 |a First Edition  
264 1 |a India :  |b BPB Publications,  |c 2024 
300 |a xviii, 353 pages :  |b illustrations ;  |c 30 cm 
336 |a text   |2 rdacontent 
337 |a unmediated   |2 rdamedia 
338 |a volume  |2 rdacarrier 
500 |a Includes index 
505 0 |a 1. Foundations of Network Forensics -- 2. Protocols and Deep Packet Analysis -- 3. Flow Analysis versus Packet Analysis -- 4. Conducting Log Analysis -- 5. Wireless Forensics -- 6. TLS Decryption and Visibility - 7.Demystifying Covert Channels -- 8. Analyzing Exploit Kits -- 9. Automating Network Forensics -- 10.Backtracking Malware -- 11. Investigating Ransomware Attacks -- 12. Investigating Command and Control Systems -- 13. Investigating Attacks on Email Servers -- 14. Investigating Web Server Attacks 
520 |a Network forensics is a rapidly growing field with a high demand for skilled professionals. This book provides a comprehensive guide on the subject, covering everything from the fundamentals to advanced topics such as malware analysis and cyber attack investigation. Written by a seasoned expert with over 15 years of experience, this hands-on guide includes practical exercises in offensive security, Windows internals, reverse engineering, and cyber forensics. The book begins with the basics of network forensics, including concepts like digital evidence, network traffic analysis, and log analysis. It teaches you how to identify intrusion attempts, mitigate cyber incidents, and investigate complex cyber attacks. As you progress through the book, you will learn more advanced topics such as malware analysis, reverse engineering, and memory forensics. You will also learn how to use network forensics tools and techniques to investigate real-world incidents. This book concludes with a discussion of the career opportunities available in network forensics and teaches you how to find a job in the field and develop your skills. 
590 |a RM 225.69  
650 0 |a Computer crimes  |x Investigation 
650 0 |a Computer networks  |x Security measures 
942 |c 1  |2 lcc 
999 |c 106007  |d 106007