Network forensics /
Material type: TextPublication details: Indiana John Wiley 2017Description: xxiv, 331 pages : illustrationsISBN: 1119328284; 9781119328285Subject(s): Computer networks | Internet | Computer networks | InternetDDC classification: 005.8 Summary: "Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way--by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn-by-doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log analysis and beyond, this book emphasizes the critical techniques that bring evidence to light"--Provided by publisher.Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
BK | Kannur University Central Library Stack | 005.8 MES/N (Browse shelf (Opens below)) | Available | 49677 |
Browsing Kannur University Central Library shelves, Shelving location: Stack Close shelf browser (Hides shelf browser)
005.8 KOS/C Cyberspace and cyber security | 005.8 LIU/F Firewall design and analysis | 005.8 MEN/C Cryptography,Network Security and cyber laws | 005.8 MES/N Network forensics / | 005.8 NEL/G Guide to computer forensics and investigations | 005.8 NIN/I Information systems security: Security Management,Metrics,Frameworks and best practices | 005.8 OTT/S Securing the virtual environment: How to defend the enterprise against attack |
Includes index.
"Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way--by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn-by-doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log analysis and beyond, this book emphasizes the critical techniques that bring evidence to light"--Provided by publisher.
There are no comments on this title.