Language:
English
日文
簡体中文
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Digital forensics for network, Inter...
~
Lillard, Terrence.
Digital forensics for network, Internet, and cloud computing[electronic resource] :a forensic evidence guide for moving targets and data /
Record Type:
Language materials, printed : Monograph/item
[NT 15000414]:
363.250285/4678
Title/Author:
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data // Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.
other author:
Lillard, Terrence.
Published:
Burlington, MA : : Syngress,, c2010.
Description:
1 online resource (xii, 353 p.) : : ill.
Notes:
Includes index.
Subject:
Computer crimes - Investigation.
Subject:
Computer security.
Subject:
Computer networks - Security measures.
Subject:
Cloud computing - Security measures.
Subject:
LAW - Forensic Science.
ISBN:
9781597495370
ISBN:
1597495379
ISBN:
9781597495387 (electronic bk.)
ISBN:
1597495387 (electronic bk.)
[NT 15000228]:
PART I INTRODUCTION -- CHAPTER 1 What Is Network Forensics? -- PART II GATHERING EVIDENCE -- CHAPTER 2 Capturing Network Traffic -- CHAPTER 3 Other Network Evidence -- PART III ANALYZING EVIDENCE WITH OPEN SOURCE SOFTWARE -- CHAPTER 4 Deciphering a TCP Header -- CHAPTER 5 Using Snort for Network-Based Forensics -- PART IV COMMERCIAL NETWORK FORENSICS APPLICATIONS -- CHAPTER 6 Commercial NetFlow Applications -- CHAPTER 7 NetWitness Investigator -- CHAPTER 8 SilentRunner by AccessData -- PART V MAKING YOUR NETWORK FORENSICS CASE -- CHAPTER 9 Incorporating Network Forensics into Incident Response Plans -- CHAPTER 10 Legal Implications and Considerations -- CHAPTER 11 Putting It All Together -- PART VI THE FUTURE OF NETWORK FORENSICS -- CHAPTER 12 The Future of Cloud Computing -- CHAPTER 13 The Future of Network Forensics -- � -- �.
[NT 15000229]:
Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies. With the explosive growth in Internet-based technology (e.g., social networks, cloud computing, telecommuting), computer and network forensics investigators are among the fastest areas of growth. Specifically, in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10K qualified specialists. Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic analysis, and deciphering TCP/IP. The current and future states of network forensics analysis tools are addressed. The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation.
Online resource:
http://www.sciencedirect.com/science/book/9781597495370
Digital forensics for network, Internet, and cloud computing[electronic resource] :a forensic evidence guide for moving targets and data /
Digital forensics for network, Internet, and cloud computing
a forensic evidence guide for moving targets and data /[electronic resource] :Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray. - Burlington, MA :Syngress,c2010. - 1 online resource (xii, 353 p.) :ill.
Includes index.
PART I INTRODUCTION -- CHAPTER 1 What Is Network Forensics? -- PART II GATHERING EVIDENCE -- CHAPTER 2 Capturing Network Traffic -- CHAPTER 3 Other Network Evidence -- PART III ANALYZING EVIDENCE WITH OPEN SOURCE SOFTWARE -- CHAPTER 4 Deciphering a TCP Header -- CHAPTER 5 Using Snort for Network-Based Forensics -- PART IV COMMERCIAL NETWORK FORENSICS APPLICATIONS -- CHAPTER 6 Commercial NetFlow Applications -- CHAPTER 7 NetWitness Investigator -- CHAPTER 8 SilentRunner by AccessData -- PART V MAKING YOUR NETWORK FORENSICS CASE -- CHAPTER 9 Incorporating Network Forensics into Incident Response Plans -- CHAPTER 10 Legal Implications and Considerations -- CHAPTER 11 Putting It All Together -- PART VI THE FUTURE OF NETWORK FORENSICS -- CHAPTER 12 The Future of Cloud Computing -- CHAPTER 13 The Future of Network Forensics -- � -- �.
Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies. With the explosive growth in Internet-based technology (e.g., social networks, cloud computing, telecommuting), computer and network forensics investigators are among the fastest areas of growth. Specifically, in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10K qualified specialists. Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic analysis, and deciphering TCP/IP. The current and future states of network forensics analysis tools are addressed. The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation.
ISBN: 9781597495370
Source: 1095083:10895611Elsevier Science & Technologyhttp://www.sciencedirect.com
UkSubjects--Topical Terms:
381638
Computer crimes
--Investigation.Index Terms--Genre/Form:
336502
Electronic books.
LC Class. No.: HV8079.C65 / D54 2010
Dewey Class. No.: 363.250285/4678
Digital forensics for network, Internet, and cloud computing[electronic resource] :a forensic evidence guide for moving targets and data /
LDR
:03915cam 2200433Ia 4500
001
352859
003
OCoLC
005
20111122085816.0
006
m d
007
cr cn|||||||||
008
120110s2010 maua o 001 0 eng d
016
7
$z
015494780
$2
Uk
019
$a
664565770
$a
679602783
$a
712992666
020
$a
9781597495370
020
$a
1597495379
020
$a
9781597495387 (electronic bk.)
020
$a
1597495387 (electronic bk.)
029
1
$a
NZ1
$b
13517287
035
$a
(OCoLC)647765304
$z
(OCoLC)664565770
$z
(OCoLC)679602783
$z
(OCoLC)712992666
035
$a
ocn647765304
037
$a
1095083:10895611
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$b
eng
$c
OPELS
$d
CDX
$d
OCLCQ
$d
N$T
$d
YDXCP
$d
UMI
$d
CEF
$d
EBLCP
$d
SNK
$d
MHW
$d
E7B
$d
OCLCQ
049
$a
TEFA
050
4
$a
HV8079.C65
$b
D54 2010
072
7
$a
LAW
$x
041000
$2
bisacsh
082
0 4
$a
363.250285/4678
$2
22
245
0 0
$a
Digital forensics for network, Internet, and cloud computing
$h
[electronic resource] :
$b
a forensic evidence guide for moving targets and data /
$c
Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.
260
$a
Burlington, MA :
$b
Syngress,
$c
c2010.
300
$a
1 online resource (xii, 353 p.) :
$b
ill.
500
$a
Includes index.
505
0
$a
PART I INTRODUCTION -- CHAPTER 1 What Is Network Forensics? -- PART II GATHERING EVIDENCE -- CHAPTER 2 Capturing Network Traffic -- CHAPTER 3 Other Network Evidence -- PART III ANALYZING EVIDENCE WITH OPEN SOURCE SOFTWARE -- CHAPTER 4 Deciphering a TCP Header -- CHAPTER 5 Using Snort for Network-Based Forensics -- PART IV COMMERCIAL NETWORK FORENSICS APPLICATIONS -- CHAPTER 6 Commercial NetFlow Applications -- CHAPTER 7 NetWitness Investigator -- CHAPTER 8 SilentRunner by AccessData -- PART V MAKING YOUR NETWORK FORENSICS CASE -- CHAPTER 9 Incorporating Network Forensics into Incident Response Plans -- CHAPTER 10 Legal Implications and Considerations -- CHAPTER 11 Putting It All Together -- PART VI THE FUTURE OF NETWORK FORENSICS -- CHAPTER 12 The Future of Cloud Computing -- CHAPTER 13 The Future of Network Forensics -- � -- �.
520
$a
Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies. With the explosive growth in Internet-based technology (e.g., social networks, cloud computing, telecommuting), computer and network forensics investigators are among the fastest areas of growth. Specifically, in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10K qualified specialists. Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic analysis, and deciphering TCP/IP. The current and future states of network forensics analysis tools are addressed. The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation.
588
$a
Description based on print version record.
650
0
$a
Computer crimes
$x
Investigation.
$3
381638
650
0
$a
Computer security.
$3
338952
650
0
$a
Computer networks
$x
Security measures.
$3
341462
650
0
$a
Cloud computing
$x
Security measures.
$3
412456
650
7
$a
LAW
$x
Forensic Science.
$2
bisacsh
$3
443854
655
4
$a
Electronic books.
$2
local
$3
336502
700
1
$a
Lillard, Terrence.
$3
443853
776
0 8
$i
Print version:
$t
Digital forensics for network, Internet, and cloud computing.
$d
Burlington, MA : Syngress, c2010
$z
9781597495370
$z
1597495379
$w
(DLC) 2010014493
$w
(OCoLC)610205800
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597495370
938
$a
Coutts Information Services
$b
COUT
$n
15047057
938
$a
YBP Library Services
$b
YANK
$n
3250423
938
$a
EBL - Ebook Library
$b
EBLB
$n
EBL629975
938
$a
ebrary
$b
EBRY
$n
ebr10408191
994
$a
C0
$b
TEF
based on 0 review(s)
Multimedia
Multimedia file
http://www.sciencedirect.com/science/book/9781597495370
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login