Cargando…

Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data /

Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investig...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Lillard, Terrence
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress, ©2010.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn647765304
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 100714s2010 maua o 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d CDX  |d OCLCQ  |d N$T  |d YDXCP  |d UMI  |d CEF  |d EBLCP  |d SNK  |d MHW  |d E7B  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d DKDLA  |d OCLCQ  |d VLB  |d OCLCQ  |d TEFOD  |d OCLCQ  |d TEFOD  |d OCLCQ  |d Z5A  |d LIV  |d OCLCQ  |d OCLCA  |d KIJ  |d OCLCF  |d D6H  |d COO  |d WYU  |d AUD  |d LEAUB  |d OL$  |d OCLCQ  |d LVT  |d UKSSU  |d DKU  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB031122  |2 bnb 
016 7 |z 015494780  |2 Uk 
019 |a 657498026  |a 664565770  |a 679602783  |a 712992666  |a 769365457  |a 1066599719  |a 1102539642  |a 1154934443  |a 1229185035 
020 |a 9781597495387  |q (electronic bk.) 
020 |a 1597495387  |q (electronic bk.) 
020 |z 9781597495370 
020 |z 1597495379 
020 0 |a 9781282755819  |q (online) 
020 |a 1282755811 
029 1 |a AU@  |b 000045964078 
029 1 |a CHBIS  |b 006513805 
029 1 |a CHVBK  |b 174567847 
029 1 |a DEBBG  |b BV042300695 
029 1 |a DEBSZ  |b 355444062 
029 1 |a DEBSZ  |b 399118292 
029 1 |a DEBSZ  |b 430922469 
029 1 |a HEBIS  |b 291514308 
029 1 |a NZ1  |b 13517287 
029 1 |a GBVCP  |b 723175640 
029 1 |a CHNEW  |b 001009766 
029 1 |a AU@  |b 000066230630 
029 1 |a AU@  |b 000054973557 
029 1 |a DKDLA  |b 820120-katalog:9910110224805765 
035 |a (OCoLC)647765304  |z (OCoLC)657498026  |z (OCoLC)664565770  |z (OCoLC)679602783  |z (OCoLC)712992666  |z (OCoLC)769365457  |z (OCoLC)1066599719  |z (OCoLC)1102539642  |z (OCoLC)1154934443  |z (OCoLC)1229185035 
037 |a 1095083:10895611  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
037 |a 9E1C895B-5C62-4B87-8256-D9AAC76CEF77  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a HV8079.C65  |b D54 2010 
072 7 |a LAW  |x 041000  |2 bisacsh 
082 0 4 |a 363.250285/4678  |2 22 
049 |a UAMI 
245 0 0 |a Digital forensics for network, Internet, and cloud computing :  |b a forensic evidence guide for moving targets and data /  |c Terrence V. Lillard [and others] ; technical editor, Jim Murray. 
260 |a Burlington, MA :  |b Syngress,  |c ©2010. 
300 |a 1 online resource (xii, 353 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies. With the explosive growth in Internet-based technology (e.g., social networks, cloud computing, telecommuting), computer and network forensics investigators are among the fastest areas of growth. Specifically, in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10K qualified specialists. Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic analysis, and deciphering TCP/IP. The current and future states of network forensics analysis tools are addressed. The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation. 
505 0 |a PART I INTRODUCTION -- CHAPTER 1 What Is Network Forensics? -- PART II GATHERING EVIDENCE -- CHAPTER 2 Capturing Network Traffic -- CHAPTER 3 Other Network Evidence -- PART III ANALYZING EVIDENCE WITH OPEN SOURCE SOFTWARE -- CHAPTER 4 Deciphering a TCP Header -- CHAPTER 5 Using Snort for Network-Based Forensics -- PART IV COMMERCIAL NETWORK FORENSICS APPLICATIONS -- CHAPTER 6 Commercial NetFlow Applications -- CHAPTER 7 NetWitness Investigator -- CHAPTER 8 SilentRunner by AccessData -- PART V MAKING YOUR NETWORK FORENSICS CASE -- CHAPTER 9 Incorporating Network Forensics into Incident Response Plans -- CHAPTER 10 Legal Implications and Considerations -- CHAPTER 11 Putting It All Together -- PART VI THE FUTURE OF NETWORK FORENSICS -- CHAPTER 12 The Future of Cloud Computing -- CHAPTER 13 The Future of Network Forensics. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Cloud computing  |x Security measures. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Infonuagique  |x Sécurité  |x Mesures. 
650 7 |a LAW  |x Forensic Science.  |2 bisacsh 
650 7 |a Computer crimes  |x Investigation  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Lillard, Terrence. 
776 0 8 |i Print version:  |t Digital forensics for network, Internet, and cloud computing.  |d Burlington, MA : Syngress, ©2010  |z 9781597495370  |z 1597495379  |w (DLC) 2010014493  |w (OCoLC)610205800 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597495387/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Coutts Information Services  |b COUT  |n 15047057 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL629975 
938 |a ebrary  |b EBRY  |n ebr10408191 
938 |a EBSCOhost  |b EBSC  |n 334663 
938 |a YBP Library Services  |b YANK  |n 3250423 
994 |a 92  |b IZTAP