語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Mastering Network Forensics : = A practical approach to investigating and defending against network attacks /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Mastering Network Forensics :/ Nipun Jaswal.
其他題名:
A practical approach to investigating and defending against network attacks /
作者:
Jaswal, Nipun.
面頁冊數:
1 online resource (372 pages)
標題:
COMPUTERS / Forensics. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000565.html
ISBN:
9789355516206
Mastering Network Forensics : = A practical approach to investigating and defending against network attacks /
Jaswal, Nipun.
Mastering Network Forensics :
A practical approach to investigating and defending against network attacks /Nipun Jaswal. - 1 online resource (372 pages)
Includes bibliographical references and index.
Mastering Network Forensics : A practical approach to investigating and defending against network attacks -- About the Author -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1 Foundations of Network Forensics -- Chapter 2 Protocols and Deep Packet Analysis -- Chapter 3 Flow Analysis versus Packet Analysis -- Chapter 4 Conducting Log Analysis -- Chapter 5 Wireless Forensics -- Chapter 6 TLS Decryption and Visibility -- Chapter 7 Demystifying Covert Channels -- Chapter 8 Analyzing Exploit Kits -- Chapter 9 Automating Network Forensics -- Chapter 10 Backtracking Malware -- Chapter 11 Investigating Ransomware Attacks -- Chapter 12 Investigating Command and Control Systems -- Chapter 13 Investigating Attacks on Email Servers -- Chapter 14 Investigating Web Server Attacks -- Index.
Access restricted to authorized users and institutions.
Network forensics is a rapidly growing field with a high demand for skilled professionals. This book provides a comprehensive guide on the subject, covering everything from the fundamentals to advanced topics such as malware analysis and cyber attack investigation. Written by a seasoned expert with over 15 years of experience, this hands-on guide includes practical exercises in offensive security, Windows internals, reverse engineering, and cyber forensics. The book begins with the basics of network forensics, including concepts like digital evidence, network traffic analysis, and log analysis. It teaches you how to identify intrusion attempts, mitigate cyber incidents, and investigate complex cyber attacks. As you progress through the book, you will learn more advanced topics such as malware analysis, reverse engineering, and memory forensics. You will also learn how to use network forensics tools and techniques to investigate real-world incidents. This book concludes with a discussion of the career opportunities available in network forensics and teaches you how to find a job in the field and develop your skills. Overall, this book is an excellent resource for anyone interested in learning about network forensics.
Mode of access: World Wide Web.
ISBN: 9789355516206Subjects--Topical Terms:
1483900
COMPUTERS / Forensics.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: HV8079.C65
Dewey Class. No.: 005.8
Mastering Network Forensics : = A practical approach to investigating and defending against network attacks /
LDR
:03041nam a2200289 i 4500
001
1157323
006
m eo d
007
cr cn |||m|||a
008
250717s2024 ob 000 0 eng d
020
$a
9789355516206
020
$a
9789355516916
035
$a
BPB0000565
041
0
$a
eng
050
0 0
$a
HV8079.C65
082
0 0
$a
005.8
100
1
$a
Jaswal, Nipun.
$3
1483924
245
1 0
$a
Mastering Network Forensics :
$b
A practical approach to investigating and defending against network attacks /
$c
Nipun Jaswal.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2024.
264
4
$c
©2024
300
$a
1 online resource (372 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Mastering Network Forensics : A practical approach to investigating and defending against network attacks -- About the Author -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1 Foundations of Network Forensics -- Chapter 2 Protocols and Deep Packet Analysis -- Chapter 3 Flow Analysis versus Packet Analysis -- Chapter 4 Conducting Log Analysis -- Chapter 5 Wireless Forensics -- Chapter 6 TLS Decryption and Visibility -- Chapter 7 Demystifying Covert Channels -- Chapter 8 Analyzing Exploit Kits -- Chapter 9 Automating Network Forensics -- Chapter 10 Backtracking Malware -- Chapter 11 Investigating Ransomware Attacks -- Chapter 12 Investigating Command and Control Systems -- Chapter 13 Investigating Attacks on Email Servers -- Chapter 14 Investigating Web Server Attacks -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
Network forensics is a rapidly growing field with a high demand for skilled professionals. This book provides a comprehensive guide on the subject, covering everything from the fundamentals to advanced topics such as malware analysis and cyber attack investigation. Written by a seasoned expert with over 15 years of experience, this hands-on guide includes practical exercises in offensive security, Windows internals, reverse engineering, and cyber forensics. The book begins with the basics of network forensics, including concepts like digital evidence, network traffic analysis, and log analysis. It teaches you how to identify intrusion attempts, mitigate cyber incidents, and investigate complex cyber attacks. As you progress through the book, you will learn more advanced topics such as malware analysis, reverse engineering, and memory forensics. You will also learn how to use network forensics tools and techniques to investigate real-world incidents. This book concludes with a discussion of the career opportunities available in network forensics and teaches you how to find a job in the field and develop your skills. Overall, this book is an excellent resource for anyone interested in learning about network forensics.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Forensics.
$2
bisacsh
$3
1483900
650
7
$a
COMPUTERS / Security / Viruses & Malware.
$2
bisacsh
$3
1483841
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000565.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入