Handbook of research on network forensics and analysis techniques

"This book explores the latest advances in network forensics and analysis techniques. It explores topics such as network security: attacks and controls, analysis of attacks, defenses, and countermeasures, anonymity, privacy, id theft and ethics, dependability and security forensics, denial-of-s...

Full description

Saved in:
Bibliographic Details
Other Authors: Shrivastava, Gulshan 1987 (Editor)
Format: Book
Language:English
Published: Hershey, PA : œb IGI Global 2018
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 92018
003 MY-KLNDU
005 20241220003415.0
008 220815 20182018xxu b 001 0 eng d
020 |a 9781522541004 (hbk) 
020 |a 9781522541011 (ebk) 
039 9 |a 202301101202  |b hainim  |y 202208150914  |z dewi 
040 |a MY-KlNDU  |b eng  |c MY-KlNDU  |e rda 
050 |a HV 8079.C65  |b H364 2018 
090 |a HV 8079.C65  |b H364 2018 
245 1 0 |a Handbook of research on network forensics and analysis techniques  |c Gulshan Shrivastava, National Institute of Technology Patna, India, [and four others] 
264 1 |a Hershey, PA : œb IGI Global  |c 2018 
264 4 |a © 2018 
300 |a xxxii, 509 pages  |b ilustrations  |c 29 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
504 |a Includes bibliographical references and index 
520 |a "This book explores the latest advances in network forensics and analysis techniques. It explores topics such as network security: attacks and controls, analysis of attacks, defenses, and countermeasures, anonymity, privacy, id theft and ethics, dependability and security forensics, denial-of-service, and botnet analysis, detection, and mitigation"--  |c Provided by publisher 
592 |a IV-101730  |b 07/10/2022  |c RM1429.00  |h YUHA Associates Sdn. Bhd 
650 0 |a Computer crimes  |x investigation 
650 0 |a Computer networks  |x Security measures 
700 1 |a Shrivastava, Gulshan  |d 1987  |e editor 
999 |a vtls000103834  |c 92018  |d 92018