Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Mastering Network Forensics = A practical approach to investigating and defending against network attacks /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Mastering Network Forensics / Nipun Jaswal.
Reminder of title:
A practical approach to investigating and defending against network attacks /
Author:
Jaswal, Nipun.
Description:
1 online resource (372 pages)
Subject:
COMPUTERS / Forensics. -
Online resource:
https://portal.igpublish.com/iglibrary/search/BPB0000565.html
ISBN:
9789355516206
Mastering Network Forensics = A practical approach to investigating and defending against network attacks /
Jaswal, Nipun.
Mastering Network Forensics
A practical approach to investigating and defending against network attacks /[electronic resource] :Nipun Jaswal. - 1 online resource (372 pages)
Includes bibliographical references and index.
Mastering Network Forensics : A practical approach to investigating and defending against network attacks -- About the Author -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1 Foundations of Network Forensics -- Chapter 2 Protocols and Deep Packet Analysis -- Chapter 3 Flow Analysis versus Packet Analysis -- Chapter 4 Conducting Log Analysis -- Chapter 5 Wireless Forensics -- Chapter 6 TLS Decryption and Visibility -- Chapter 7 Demystifying Covert Channels -- Chapter 8 Analyzing Exploit Kits -- Chapter 9 Automating Network Forensics -- Chapter 10 Backtracking Malware -- Chapter 11 Investigating Ransomware Attacks -- Chapter 12 Investigating Command and Control Systems -- Chapter 13 Investigating Attacks on Email Servers -- Chapter 14 Investigating Web Server Attacks -- Index.
Access restricted to authorized users and institutions.
Network forensics is a rapidly growing field with a high demand for skilled professionals. This book provides a comprehensive guide on the subject, covering everything from the fundamentals to advanced topics such as malware analysis and cyber attack investigation. Written by a seasoned expert with over 15 years of experience, this hands-on guide includes practical exercises in offensive security, Windows internals, reverse engineering, and cyber forensics. The book begins with the basics of network forensics, including concepts like digital evidence, network traffic analysis, and log analysis. It teaches you how to identify intrusion attempts, mitigate cyber incidents, and investigate complex cyber attacks. As you progress through the book, you will learn more advanced topics such as malware analysis, reverse engineering, and memory forensics. You will also learn how to use network forensics tools and techniques to investigate real-world incidents. This book concludes with a discussion of the career opportunities available in network forensics and teaches you how to find a job in the field and develop your skills. Overall, this book is an excellent resource for anyone interested in learning about network forensics.
Mode of access: World Wide Web.
ISBN: 9789355516206Subjects--Topical Terms:
1483900
COMPUTERS / Forensics.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: HV8079.C65
Dewey Class. No.: 005.8
Mastering Network Forensics = A practical approach to investigating and defending against network attacks /
LDR
:03067nam a2200289 i 4500
001
1157323
006
m eo d
007
cr cn |||m|||a
008
250717s2024 ob 000 0 eng d
020
$a
9789355516206
020
$a
9789355516916
035
$a
BPB0000565
041
0 #
$a
eng
050
0 0
$a
HV8079.C65
082
0 0
$a
005.8
100
1
$a
Jaswal, Nipun.
$3
1483924
245
1 0
$a
Mastering Network Forensics
$b
A practical approach to investigating and defending against network attacks /
$c
Nipun Jaswal.
$h
[electronic resource] :
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2024.
264
4
$c
©2024
300
$a
1 online resource (372 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0 #
$a
Mastering Network Forensics : A practical approach to investigating and defending against network attacks -- About the Author -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1 Foundations of Network Forensics -- Chapter 2 Protocols and Deep Packet Analysis -- Chapter 3 Flow Analysis versus Packet Analysis -- Chapter 4 Conducting Log Analysis -- Chapter 5 Wireless Forensics -- Chapter 6 TLS Decryption and Visibility -- Chapter 7 Demystifying Covert Channels -- Chapter 8 Analyzing Exploit Kits -- Chapter 9 Automating Network Forensics -- Chapter 10 Backtracking Malware -- Chapter 11 Investigating Ransomware Attacks -- Chapter 12 Investigating Command and Control Systems -- Chapter 13 Investigating Attacks on Email Servers -- Chapter 14 Investigating Web Server Attacks -- Index.
506
#
$a
Access restricted to authorized users and institutions.
520
3
$a
Network forensics is a rapidly growing field with a high demand for skilled professionals. This book provides a comprehensive guide on the subject, covering everything from the fundamentals to advanced topics such as malware analysis and cyber attack investigation. Written by a seasoned expert with over 15 years of experience, this hands-on guide includes practical exercises in offensive security, Windows internals, reverse engineering, and cyber forensics. The book begins with the basics of network forensics, including concepts like digital evidence, network traffic analysis, and log analysis. It teaches you how to identify intrusion attempts, mitigate cyber incidents, and investigate complex cyber attacks. As you progress through the book, you will learn more advanced topics such as malware analysis, reverse engineering, and memory forensics. You will also learn how to use network forensics tools and techniques to investigate real-world incidents. This book concludes with a discussion of the career opportunities available in network forensics and teaches you how to find a job in the field and develop your skills. Overall, this book is an excellent resource for anyone interested in learning about network forensics.
538
$a
Mode of access: World Wide Web.
650
# 7
$a
COMPUTERS / Forensics.
$2
bisacsh
$3
1483900
650
# 7
$a
COMPUTERS / Security / Viruses & Malware.
$2
bisacsh
$3
1483841
655
# 4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000565.html
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login