Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
Every digital device-phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to c...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Birmingham, UK
Packt Publishing
2016
|
| Series: | Community experience distilled
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 c 4500 | ||
|---|---|---|---|
| 001 | 92290 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220003501.0 | ||
| 008 | 220726s20162016xxka 001 0 eng d | ||
| 020 | |a 9781782174905 (pbk) | ||
| 039 | 9 | |a 202211221117 |b rafizah |y 202207260938 |z dewi | |
| 040 | |a MY-KlNDU |b eng |c MY-KlNDU |e rda | ||
| 050 | |a TK 5105.59 |b .D38 2016 | ||
| 090 | |a TK 5105.59 |b .D38 2016 | ||
| 100 | 1 | |a Datt, Samir |e author | |
| 245 | 1 | 0 | |a Learning network forensics |b identify and safeguard your network against both internal and external threats, hackers, and malware attacks |c Samir Datt |
| 264 | 1 | |a Birmingham, UK |b Packt Publishing |c 2016 | |
| 264 | 4 | |c © 2016 | |
| 300 | |a xi, 249 pages |b illustrations |c 24 cm. | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 490 | 1 | |a Community experience distilled | |
| 500 | |a Includes index | ||
| 520 | |a Every digital device-phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to catch miscreants on the network.The book starts with an introduction to the world of network forensics and investigations. You will begin by getting an understanding of how to gather both physical and virtual evidence, intercepting and analyzing network data, wireless data packets, investigating intrusions, and so on. You will further explore the technology, tools, and investigating methods using malware forensics, network tunneling, and behaviors. By the end of the book, you will gain a complete understanding of how to successfully close a case. | ||
| 592 | |a IN/016413 |b 14/9/2022 |c RM 299.45 |h Innowawasan | ||
| 650 | 0 | |a Computer networks |x Security measures | |
| 650 | 0 | |a Local area networks (Computer networks |x Security measures | |
| 650 | 0 | |a Business enterprises |x Computer networks |x Security measures | |
| 650 | 0 | |a Computer crimes |x investigation | |
| 830 | 0 | |a Community experience distilled | |
| 999 | |a vtls000103686 |c 92290 |d 92290 | ||


