Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks - Helion
Tytuł oryginału: Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
ISBN: 9781785282126
stron: 274, Format: ebook
Data wydania: 2016-02-29
Księgarnia: Helion
Cena książki: 134,10 zł (poprzednio: 149,00 zł)
Oszczędzasz: 10% (-14,90 zł)
We live in a highly networked world. Every digital device—phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to catch miscreants on the network.
The book starts with an introduction to the world of network forensics and investigations. You will begin by getting an understanding of how to gather both physical and virtual evidence, intercepting and analyzing network data, wireless data packets, investigating intrusions, and so on. You will further explore the technology, tools, and investigating methods using malware forensics, network tunneling, and behaviors. By the end of the book, you will gain a complete understanding of how to successfully close a case.
Osoby które kupowały "Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks", wybierały także:
- Windows Media Center. Domowe centrum rozrywki 66,67 zł, (8,00 zł -88%)
- Ruby on Rails. Ćwiczenia 18,75 zł, (3,00 zł -84%)
- Przywództwo w świecie VUCA. Jak być skutecznym liderem w niepewnym środowisku 58,64 zł, (12,90 zł -78%)
- Scrum. O zwinnym zarządzaniu projektami. Wydanie II rozszerzone 58,64 zł, (12,90 zł -78%)
- Od hierarchii do turkusu, czyli jak zarządzać w XXI wieku 58,64 zł, (12,90 zł -78%)
Spis treści
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks eBook -- spis treści
- 1. Becoming Network 007s
- 2. Laying Hands on Evidence
- 3. Capturing & Analyzing Data Packets
- 4. Going Wireless
- 5. Catching Intruders in the Network
- 6. Connecting the Dots Event Logs
- 7. Proxies, Firewalls and Routers
- 8. Smuggling Forbidden Protocols Network Tunneling
- 9. Understanding Malware Forensics
- 10. Closing the Deal Solving the Case