Cargando…

Network Forensics

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Messier, Ric
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated, 2017.
Colección:New York Academy of Sciences Ser.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Intro
  • Title Page
  • Table of Contents
  • Introduction
  • What This Book Covers
  • How This Book Is Organized
  • 1 Introduction to Network Forensics
  • What Is Forensics?
  • Incident Response
  • The Need for Network Forensic Practitioners
  • Summary
  • References
  • 2 Networking Basics
  • Protocols
  • Request for Comments
  • Internet Registries
  • Internet Protocol and Addressing
  • Transmission Control Protocol (TCP)
  • User Datagram Protocol (UDP)
  • Ports
  • Domain Name System
  • Support Protocols (DHCP)
  • Support Protocols (ARP)
  • Summary
  • References
  • 3 Host-Side Artifacts
  • Services
  • Connections
  • Tools
  • Summary
  • 4 Packet Capture and Analysis
  • Capturing Packets
  • Packet Analysis with Wireshark
  • Network Miner
  • Summary
  • 5 Attack Types
  • Denial of Service Attacks
  • Vulnerability Exploits
  • Insider Threats
  • Evasion
  • Application Attacks
  • Summary
  • 6 Location Awareness
  • Time Zones
  • Using whois
  • Traceroute
  • Geolocation
  • Location-Based Services
  • WiFi Positioning
  • Summary
  • 7 Preparing for Attacks
  • NetFlow
  • Logging
  • Antivirus
  • Incident Response Preparation
  • Security Information and Event Management
  • Summary
  • 8 Intrusion Detection Systems
  • Detection Styles
  • Host-Based versus Network-Based
  • Architecture
  • Alerting
  • Summary
  • 9 Using Firewall and Application Logs
  • Syslog
  • Event Viewer
  • Firewall Logs
  • Common Log Format
  • Summary
  • 10 Correlating Attacks
  • Time Synchronization
  • Packet Capture Times
  • Log Aggregation and Management
  • Timelines
  • Security Information and Event Management
  • Summary
  • 11 Network Scanning
  • Port Scanning
  • Vulnerability Scanning
  • Port Knocking
  • Tunneling
  • Passive Data Gathering
  • Summary
  • 12 Final Considerations
  • Encryption
  • Cloud Computing
  • The Onion Router (TOR)
  • Summary
  • End User License Agreement