Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
Network Intrusion Analysis teaches the reader about the various tools and techniques to use during a network intrusion investigation. The book focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns. This is the first book that provides such a thoro...
Saved in:
| Other Authors: | Fichera, Joe, 1966-, Bolt, Steven |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Amsterdam
Elsevier
2013.
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Handbook of research on intrusion detection systems
Published: (2020)
Published: (2020)
Real digital forensics computer security and incident response
by: Jones (Keith John)
Published: (2005)
by: Jones (Keith John)
Published: (2005)
Dissecting the hack the forb1dd3n network
Published: (2010)
Published: (2010)
Internet forensics
by: Jones, Robert
Published: (2006)
by: Jones, Robert
Published: (2006)
Guide to computer forensics and investigations
Published: (2008)
Published: (2008)
Hacking exposed computer forensics
by: Philipp, Aaron
Published: (2010)
by: Philipp, Aaron
Published: (2010)
Handbook of research on network forensics and analysis techniques
Published: (2018)
Published: (2018)
Mastering Network Forensics : A practical approach to investigating and defending against network attacks /
by: Jaswal, Nipun
Published: (2024)
by: Jaswal, Nipun
Published: (2024)
Intrusion detection a machine learning approach
by: Yu, Zhenwei
Published: (2011)
by: Yu, Zhenwei
Published: (2011)
Network forensics tracking hackers through cyberspace
by: Davidoff, Sherri
Published: (2012)
by: Davidoff, Sherri
Published: (2012)
Windows forensic analysis DVD toolkit
by: Carvey, Harlan A.
Published: (2009)
by: Carvey, Harlan A.
Published: (2009)
Network traffic anomaly detection and prevention concepts, techniques, and tools
by: Bhuyan, Monowar H., et al.
Published: (2017)
by: Bhuyan, Monowar H., et al.
Published: (2017)
Network forensics
by: Messier, Ric
Published: (2017)
by: Messier, Ric
Published: (2017)
Cyber crime investigations Bridging the gaps between security professionals,law enforcement and prosecutors
by: Reyes
Published: (2007)
by: Reyes
Published: (2007)
Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by: Datt, Samir
Published: (2016)
by: Datt, Samir
Published: (2016)
Practical intrusion analysis prevention and detection for the twenty-first century
by: Trost, Ryan
Published: (2010)
by: Trost, Ryan
Published: (2010)
Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats
by: Johansen, Gerard
Published: (2020)
by: Johansen, Gerard
Published: (2020)
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Managing security with Snort and IDS tools
by: Cox, Kerry
Published: (2004)
by: Cox, Kerry
Published: (2004)
Crimeware understanding new attacks and defenses
Published: (2008)
Published: (2008)
Cisco router and switch forensics investigating and analyzing malicious network activity
by: Liu, Dale
Published: (2009)
by: Liu, Dale
Published: (2009)
Alternate data storage forensics cAmber Schroader, Tyler Cohen
by: Schroader, Amber
by: Schroader, Amber
Digital forensics and incident response incident response tools and techniques for effective cyber threat response
by: Johansen, Gerard
Published: (2022)
by: Johansen, Gerard
Published: (2022)
The Tao of network security monitoring beyond intrusion detection
by: Bejtlich ,Richard
Published: (2005)
by: Bejtlich ,Richard
Published: (2005)
Building internet firewalls
by: ZwickylhElizabeth D.
by: ZwickylhElizabeth D.
Practical Mobile Forensics Forensically investigate and analyze iOS, Android, and Windows 10 devices
by: Tamma, Rohit, et al.
Published: (2020)
by: Tamma, Rohit, et al.
Published: (2020)
Internet security you can afford using Untangle as your internet gateway
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Cybersecurity Strategies and Best Practices : A comprehensive guide to mastering enterprise cyber defense tactics and techniques /
by: Aslaner, Milad
Published: (2024)
by: Aslaner, Milad
Published: (2024)
Terrorism and organized hate crime intelligence gathering, analysis, and investigations
by: Ronczkowski
Published: (2007)
by: Ronczkowski
Published: (2007)
Network attacks and exploitation a framework
by: Monte, Matthew
Published: (2015)
by: Monte, Matthew
Published: (2015)
Protect your privacy on the Internet Privacy defense tools and techniques you can use right now
by: Pfaffenberger
Published: (1997)
by: Pfaffenberger
Published: (1997)
Inside network perimeter security the definitive guide to firewalls, VPNs, routers, and intrusion detection systems
by: Northcutt, Stephen, et al.
Published: (2005)
by: Northcutt, Stephen, et al.
Published: (2005)
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
Windows registry forensics advanced digital forensic analysis of the windows registry
by: Carvey, Harlan
Published: (2016)
by: Carvey, Harlan
Published: (2016)
Computer incident response and forensics team management conducting a successful incident response
by: Johnson, Leighton
Published: (2014)
by: Johnson, Leighton
Published: (2014)
Cybersecurity attack and defense strategies
by: Yuri, Diogenes, et al.
Published: (2019)
by: Yuri, Diogenes, et al.
Published: (2019)
Cybersecurity for beginners
by: Meeuwisse, Raef
Published: (2017)
by: Meeuwisse, Raef
Published: (2017)
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics
by: Diogenes, Yuri, et al.
Published: (2018)
by: Diogenes, Yuri, et al.
Published: (2018)
Guide to network security
by: Whitman, Michael E., et al.
Published: (2013)
by: Whitman, Michael E., et al.
Published: (2013)
Similar Items
-
Handbook of research on intrusion detection systems
Published: (2020) -
Real digital forensics computer security and incident response
by: Jones (Keith John)
Published: (2005) -
Dissecting the hack the forb1dd3n network
Published: (2010) -
Internet forensics
by: Jones, Robert
Published: (2006) -
Guide to computer forensics and investigations
Published: (2008)


