Digital forensics for network, Inter...
Lillard, Terrence.

 

  • Digital forensics for network, Internet, and cloud computing[electronic resource] :a forensic evidence guide for moving targets and data /
  • 紀錄類型: 書目-語言資料,印刷品 : Monograph/item
    杜威分類號: 363.250285/4678
    書名/作者: Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data // Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.
    其他作者: Lillard, Terrence.
    出版者: Burlington, MA : : Syngress,, c2010.
    面頁冊數: 1 online resource (xii, 353 p.) : : ill.
    附註: Includes index.
    標題: Computer crimes - Investigation.
    標題: Computer security.
    標題: Computer networks - Security measures.
    標題: Cloud computing - Security measures.
    標題: LAW - Forensic Science.
    ISBN: 9781597495370
    ISBN: 1597495379
    ISBN: 9781597495387 (electronic bk.)
    ISBN: 1597495387 (electronic bk.)
    內容註: PART I INTRODUCTION -- CHAPTER 1 What Is Network Forensics? -- PART II GATHERING EVIDENCE -- CHAPTER 2 Capturing Network Traffic -- CHAPTER 3 Other Network Evidence -- PART III ANALYZING EVIDENCE WITH OPEN SOURCE SOFTWARE -- CHAPTER 4 Deciphering a TCP Header -- CHAPTER 5 Using Snort for Network-Based Forensics -- PART IV COMMERCIAL NETWORK FORENSICS APPLICATIONS -- CHAPTER 6 Commercial NetFlow Applications -- CHAPTER 7 NetWitness Investigator -- CHAPTER 8 SilentRunner by AccessData -- PART V MAKING YOUR NETWORK FORENSICS CASE -- CHAPTER 9 Incorporating Network Forensics into Incident Response Plans -- CHAPTER 10 Legal Implications and Considerations -- CHAPTER 11 Putting It All Together -- PART VI THE FUTURE OF NETWORK FORENSICS -- CHAPTER 12 The Future of Cloud Computing -- CHAPTER 13 The Future of Network Forensics -- � -- �.
    摘要、提要註: Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies. With the explosive growth in Internet-based technology (e.g., social networks, cloud computing, telecommuting), computer and network forensics investigators are among the fastest areas of growth. Specifically, in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10K qualified specialists. Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic analysis, and deciphering TCP/IP. The current and future states of network forensics analysis tools are addressed. The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation.
    電子資源: http://www.sciencedirect.com/science/book/9781597495370
評論
Export
取書館別
 
 
變更密碼
登入