|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_on1347025020 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu|||||||| |
008 |
230209s2017 xx o ||| 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d HF9
|d OCLCQ
|d EBLCP
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCL
|d OCLCQ
|
020 |
|
|
|a 1119328284
|
020 |
|
|
|a 9781119328285
|
020 |
|
|
|a 9781119329183
|
020 |
|
|
|a 1119329183
|
035 |
|
|
|a (OCoLC)1347025020
|
050 |
|
4 |
|a TK5105.59
|b .M47 2017
|
082 |
0 |
4 |
|a 005.8
|q OCoLC
|2 23/eng/20230216
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Messier, Ric.
|
245 |
1 |
0 |
|a Network Forensics
|h [electronic resource].
|
260 |
|
|
|a Newark :
|b John Wiley & Sons, Incorporated,
|c 2017.
|
300 |
|
|
|a 1 online resource (355 p.).
|
490 |
1 |
|
|a New York Academy of Sciences Ser.
|
500 |
|
|
|a Description based upon print version of record.
|
505 |
0 |
|
|a Intro -- Title Page -- Table of Contents -- Introduction -- What This Book Covers -- How This Book Is Organized -- 1 Introduction to Network Forensics -- What Is Forensics? -- Incident Response -- The Need for Network Forensic Practitioners -- Summary -- References -- 2 Networking Basics -- Protocols -- Request for Comments -- Internet Registries -- Internet Protocol and Addressing -- Transmission Control Protocol (TCP) -- User Datagram Protocol (UDP) -- Ports -- Domain Name System -- Support Protocols (DHCP) -- Support Protocols (ARP) -- Summary -- References -- 3 Host-Side Artifacts
|
505 |
8 |
|
|a Services -- Connections -- Tools -- Summary -- 4 Packet Capture and Analysis -- Capturing Packets -- Packet Analysis with Wireshark -- Network Miner -- Summary -- 5 Attack Types -- Denial of Service Attacks -- Vulnerability Exploits -- Insider Threats -- Evasion -- Application Attacks -- Summary -- 6 Location Awareness -- Time Zones -- Using whois -- Traceroute -- Geolocation -- Location-Based Services -- WiFi Positioning -- Summary -- 7 Preparing for Attacks -- NetFlow -- Logging -- Antivirus -- Incident Response Preparation -- Security Information and Event Management -- Summary
|
505 |
8 |
|
|a 8 Intrusion Detection Systems -- Detection Styles -- Host-Based versus Network-Based -- Architecture -- Alerting -- Summary -- 9 Using Firewall and Application Logs -- Syslog -- Event Viewer -- Firewall Logs -- Common Log Format -- Summary -- 10 Correlating Attacks -- Time Synchronization -- Packet Capture Times -- Log Aggregation and Management -- Timelines -- Security Information and Event Management -- Summary -- 11 Network Scanning -- Port Scanning -- Vulnerability Scanning -- Port Knocking -- Tunneling -- Passive Data Gathering -- Summary -- 12 Final Considerations -- Encryption
|
505 |
8 |
|
|a Cloud Computing -- The Onion Router (TOR) -- Summary -- End User License Agreement
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
655 |
|
0 |
|a Electronic books.
|
758 |
|
|
|i has work:
|a Network Forensics (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFHxThdMJhW4c6cCbhcPry
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Messier, Ric
|t Network Forensics
|d Newark : John Wiley & Sons, Incorporated,c2017
|z 9781119328285
|
830 |
|
0 |
|a New York Academy of Sciences Ser.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=7104514
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL7104514
|
994 |
|
|
|a 92
|b IZTAP
|