Cargando…

Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response /

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Fichera, Joe, 1966-
Otros Autores: Bolt, Steven
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, ©2012.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn815518159
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 121031s2012 mau ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OCLCQ  |d UMI  |d COO  |d DEBSZ  |d OCLCO  |d UIU  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d U3W  |d D6H  |d CEF  |d WYU  |d UAB  |d LEAUB  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 842426557 
020 |a 9781597499712 
020 |a 1597499714 
020 |z 9781597499620 
020 |z 1597499625 
029 1 |a AU@  |b 000050608235 
029 1 |a AU@  |b 000051432871 
029 1 |a AU@  |b 000066217801 
029 1 |a AU@  |b 000067094009 
029 1 |a CHNEW  |b 001010770 
029 1 |a DEBBG  |b BV041121669 
029 1 |a DEBBG  |b BV042305247 
029 1 |a DEBSZ  |b 396765890 
029 1 |a DEBSZ  |b 405345720 
029 1 |a NZ1  |b 15189142 
035 |a (OCoLC)815518159  |z (OCoLC)842426557 
037 |a CL0500000215  |b Safari Books Online 
043 |a n-us--- 
050 4 |a TK5105.59  |b .F53 2012 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Fichera, Joe,  |d 1966- 
245 1 0 |a Network intrusion analysis :  |b methodologies, tools, and techniques for incident analysis and response /  |c Joe Fichera, Steven Bolt. 
260 |a Waltham, MA :  |b Syngress,  |c ©2012. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full operation. Network Intrusion Analysis teaches the reader about the various tools and techniques to use during a network intrusion investigation. The book focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns. This is the first book that provides such a thorough analysis of network intrusion investigation and response. Network Intrusion Analysis addresses the entire process of investigating a network intrusion by: Providing a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion. Providing real-world examples of network intrusions, along with associated workarounds. Walking you through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation. Network Intrusion Analysis addresses the entire process of investigating a network intrusion. Provides a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion. Provides real-world examples of network intrusions, along with associated workarounds. Walks readers through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation. 
504 |a Includes bibliographical references and index. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer networks  |x Access control. 
650 0 |a Computer crimes  |x Investigation. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 7 |a Computer crimes  |x Investigation.  |2 fast  |0 (OCoLC)fst00872065 
650 7 |a Computer networks  |x Access control.  |2 fast  |0 (OCoLC)fst00872298 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
700 1 |a Bolt, Steven. 
776 0 8 |i Print version:  |a Fichera, Joe, 1966-  |t Network intrusion analysis  |z 9781597499620  |w (DLC) 2012041535  |w (OCoLC)815757825 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597499620/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP