Cargando…

Network Forensics

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Messier, Ric
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated, 2017.
Colección:New York Academy of Sciences Ser.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_on1347025020
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu||||||||
008 230209s2017 xx o ||| 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d HF9  |d OCLCQ  |d EBLCP  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL  |d OCLCQ 
020 |a 1119328284 
020 |a 9781119328285 
020 |a 9781119329183 
020 |a 1119329183 
035 |a (OCoLC)1347025020 
050 4 |a TK5105.59  |b .M47 2017 
082 0 4 |a 005.8  |q OCoLC  |2 23/eng/20230216 
049 |a UAMI 
100 1 |a Messier, Ric. 
245 1 0 |a Network Forensics  |h [electronic resource]. 
260 |a Newark :  |b John Wiley & Sons, Incorporated,  |c 2017. 
300 |a 1 online resource (355 p.). 
490 1 |a New York Academy of Sciences Ser. 
500 |a Description based upon print version of record. 
505 0 |a Intro -- Title Page -- Table of Contents -- Introduction -- What This Book Covers -- How This Book Is Organized -- 1 Introduction to Network Forensics -- What Is Forensics? -- Incident Response -- The Need for Network Forensic Practitioners -- Summary -- References -- 2 Networking Basics -- Protocols -- Request for Comments -- Internet Registries -- Internet Protocol and Addressing -- Transmission Control Protocol (TCP) -- User Datagram Protocol (UDP) -- Ports -- Domain Name System -- Support Protocols (DHCP) -- Support Protocols (ARP) -- Summary -- References -- 3 Host-Side Artifacts 
505 8 |a Services -- Connections -- Tools -- Summary -- 4 Packet Capture and Analysis -- Capturing Packets -- Packet Analysis with Wireshark -- Network Miner -- Summary -- 5 Attack Types -- Denial of Service Attacks -- Vulnerability Exploits -- Insider Threats -- Evasion -- Application Attacks -- Summary -- 6 Location Awareness -- Time Zones -- Using whois -- Traceroute -- Geolocation -- Location-Based Services -- WiFi Positioning -- Summary -- 7 Preparing for Attacks -- NetFlow -- Logging -- Antivirus -- Incident Response Preparation -- Security Information and Event Management -- Summary 
505 8 |a 8 Intrusion Detection Systems -- Detection Styles -- Host-Based versus Network-Based -- Architecture -- Alerting -- Summary -- 9 Using Firewall and Application Logs -- Syslog -- Event Viewer -- Firewall Logs -- Common Log Format -- Summary -- 10 Correlating Attacks -- Time Synchronization -- Packet Capture Times -- Log Aggregation and Management -- Timelines -- Security Information and Event Management -- Summary -- 11 Network Scanning -- Port Scanning -- Vulnerability Scanning -- Port Knocking -- Tunneling -- Passive Data Gathering -- Summary -- 12 Final Considerations -- Encryption 
505 8 |a Cloud Computing -- The Onion Router (TOR) -- Summary -- End User License Agreement 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
655 0 |a Electronic books. 
758 |i has work:  |a Network Forensics (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFHxThdMJhW4c6cCbhcPry  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Messier, Ric  |t Network Forensics  |d Newark : John Wiley & Sons, Incorporated,c2017  |z 9781119328285 
830 0 |a New York Academy of Sciences Ser. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=7104514  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL7104514 
994 |a 92  |b IZTAP