Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks

Every digital device-phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to c...

Full description

Saved in:
Bibliographic Details
Main Author: Datt, Samir (Author)
Format: Book
Language:English
Published: Birmingham, UK Packt Publishing 2016
Series:Community experience distilled
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 92290
003 MY-KLNDU
005 20241220003501.0
008 220726s20162016xxka 001 0 eng d
020 |a 9781782174905 (pbk) 
039 9 |a 202211221117  |b rafizah  |y 202207260938  |z dewi 
040 |a MY-KlNDU  |b eng  |c MY-KlNDU  |e rda 
050 |a TK 5105.59  |b .D38 2016 
090 |a TK 5105.59  |b .D38 2016 
100 1 |a Datt, Samir  |e author 
245 1 0 |a Learning network forensics  |b identify and safeguard your network against both internal and external threats, hackers, and malware attacks  |c Samir Datt 
264 1 |a Birmingham, UK  |b Packt Publishing  |c 2016 
264 4 |c © 2016 
300 |a xi, 249 pages  |b illustrations  |c 24 cm. 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
490 1 |a Community experience distilled 
500 |a Includes index 
520 |a Every digital device-phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to catch miscreants on the network.The book starts with an introduction to the world of network forensics and investigations. You will begin by getting an understanding of how to gather both physical and virtual evidence, intercepting and analyzing network data, wireless data packets, investigating intrusions, and so on. You will further explore the technology, tools, and investigating methods using malware forensics, network tunneling, and behaviors. By the end of the book, you will gain a complete understanding of how to successfully close a case. 
592 |a IN/016413  |b 14/9/2022  |c RM 299.45  |h Innowawasan 
650 0 |a Computer networks  |x Security measures 
650 0 |a Local area networks (Computer networks  |x Security measures 
650 0 |a Business enterprises  |x Computer networks  |x Security measures 
650 0 |a Computer crimes  |x investigation 
830 0 |a Community experience distilled 
999 |a vtls000103686  |c 92290  |d 92290