This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the functioning of the Internet and its core protocols. This, in turn, enables the identification of shortcomings and highlights where improvements can be made for a more secure network. Topics and features: provides learning objectives in every chapter, and review questions throughout the book to test understanding; introduces the basic concepts of network process models, network forensics frameworks and network forensics tools; discusses various techniques for the acquisition of packets in a network forensics system, network forensics analysis, and attribution in network forensics; examines a range of advanced topics, including botnet, smartphone, and cloud forensics; reviews a number of freely available tools for performing forensic activities.
Subscribe to:
Post Comments (Atom)
The Colt 1911 Pistol (Osprey Weapon 9)
Download The Colt 1911 Pistol (Osprey Weapon 9) First used in combat during the Punitive Expedition into Me...
-
Download Drawdown: The Most Comprehensive Plan Ever Proposed To Reverse Global Warming The 100 most substan...
-
Download Invision Power Board 2: A User Guide. This book is your guide to configuring, managing and maintai...
-
Download The Grant Cardone Rebuttal Manual 200+ Page Rebuttal Manual. Learn to handle any objection with th...
No comments:
Post a Comment