Network Forensics PDF

Network Forensics PDF

Name:
Network Forensics PDF

Published Date:
07/01/2017

Status:
Active

Description:

Publisher:
John Wiley and Sons

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
Need Help?

Intensively hands-on training for real-world network forensics

Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way—by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn-by-doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log analysis and beyond, this book emphasizes the critical techniques that bring evidence to light.

Network forensics is a growing field, and is becoming increasingly central to law enforcement as cybercrime becomes more and more sophisticated. This book provides an unprecedented level of hands-on training to give investigators the skills they need.

  • Investigate packet captures to examine network communications
  • Locate host-based artifacts and analyze network logs
  • Understand intrusion detection systems—and let them do the legwork
  • Have the right architecture and systems in place ahead of an incident

Network data is always changing, and is never saved in one place; an investigator must understand how to examine data over time, which involves specialized skills that go above and beyond memory, mobile, or data forensics. Whether you're preparing for a security certification or just seeking deeper training for a law enforcement or IT role, you can only learn so much from concept; to thoroughly understand something, you need to do it. Network Forensics provides intensive hands-on practice with direct translation to real-world application.


ISBN(s) : 9781119328285
Published : 07/01/2017

History


Related products


Best-Selling Products

DIN EN ISO/IEC 12792 - DRAFT
Published Date: 06/01/2024
Draft Document - Information technology - Artificial intelligence - Transparency taxonomy of AI systems (ISO/IEC DIS 12792:2024); German and English version prEN ISO/IEC 12792:2024
$46.434
DIN EN ISO/IEC 13818-1
Published Date: 06/01/1997
Information technology - Generic of coding of moving pictures and associated audio information - Part 1: Systems (ISO/IEC 13818-1:1996); English version EN ISO/IEC 13818-1:1997
$68.016
DIN EN ISO/IEC 15408-1 - DRAFT
Published Date: 01/01/2020
Draft Document - Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC 15408-1:2009); English version prEN ISO/IEC 15408-1:2019
$60.495
DIN EN ISO/IEC 15408-1 - DRAFT
Published Date: 06/01/2020
Draft Document - Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC 15408-1:2009); German and English version prEN ISO/IEC 15408-1:2019
$55.263
DIN EN ISO/IEC 15408-1 - DRAFT
Published Date: 01/01/2024
Draft Document - Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC 15408-1:2022); German and English version prEN ISO/IEC 15408-1:2023
$86.328
DIN EN ISO/IEC 15408-1
Published Date: 12/01/2020
Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC 15408-1:2009)
$68.997