Network Forensics Network Forensics

Network Forensics

    • 46,99 €
    • 46,99 €

Beschreibung des Verlags

Intensively hands-on training for real-world network forensics
Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way—by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn-by-doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log analysis and beyond, this book emphasizes the critical techniques that bring evidence to light.

Network forensics is a growing field, and is becoming increasingly central to law enforcement as cybercrime becomes more and more sophisticated. This book provides an unprecedented level of hands-on training to give investigators the skills they need.
Investigate packet captures to examine network communications Locate host-based artifacts and analyze network logs Understand intrusion detection systems—and let them do the legwork Have the right architecture and systems in place ahead of an incident
Network data is always changing, and is never saved in one place; an investigator must understand how to examine data over time, which involves specialized skills that go above and beyond memory, mobile, or data forensics. Whether you're preparing for a security certification or just seeking deeper training for a law enforcement or IT role, you can only learn so much from concept; to thoroughly understand something, you need to do it. Network Forensics provides intensive hands-on practice with direct translation to real-world application.

GENRE
Computer und Internet
ERSCHIENEN
2017
14. Juli
SPRACHE
EN
Englisch
UMFANG
368
Seiten
VERLAG
Wiley
ANBIETERINFO
John Wiley & Sons Ltd
GRÖSSE
25,4
 MB
Understanding Network Hacks Understanding Network Hacks
2021
Network Security Through Data Analysis Network Security Through Data Analysis
2017
Practical Packet Analysis, 3rd Edition Practical Packet Analysis, 3rd Edition
2007
Understanding Network Hacks Understanding Network Hacks
2015
Tao of Network Security Monitoring, The: Beyond Intrusion Detection Tao of Network Security Monitoring, The: Beyond Intrusion Detection
2004
Linux Firewalls Linux Firewalls
2015
CEH v11 Certified Ethical Hacker Study Guide CEH v11 Certified Ethical Hacker Study Guide
2021
CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions
2023
CEH v11 CEH v11
2021
Kali Linux. Testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie. Wydanie II Kali Linux. Testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie. Wydanie II
2025
Aprendendo Kali Linux – 2ª Edição Aprendendo Kali Linux – 2ª Edição
2025
Kali Linux. Testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie Kali Linux. Testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie
2019