Network Intrusion Analysis
Autor Joe Ficheraen Limba Engleză Paperback – 16 iul 2014
Network Intrusion Analysis teaches the reader about the various tools and techniques to use during a network intrusion investigation. The book focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns. This is the first book that provides such a thorough analysis of network intrusion investigation and response.
Network Intrusion Analysis addresses the entire process of investigating a network intrusion by: *Providing a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion. *Providing real-world examples of network intrusions, along with associated workarounds. *Walking you through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation.
- Network Intrusion Analysis addresses the entire process of investigating a network intrusion
- Provides a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion
- Provides real-world examples of network intrusions, along with associated workarounds
- Walks readers through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation
Preț: 324.49 lei
Preț vechi: 405.61 lei
-20%
Puncte Express: 487
Carte tipărită la comandă
Livrare economică 24 iunie-08 iulie
Specificații
ISBN-13: 9781597499620
ISBN-10: 1597499625
Pagini: 252
Ilustrații: Illustrated
Dimensiuni: 189 x 233 x 15 mm
Greutate: 0.44 kg
Editura: Elsevier Inc
ISBN-10: 1597499625
Pagini: 252
Ilustrații: Illustrated
Dimensiuni: 189 x 233 x 15 mm
Greutate: 0.44 kg
Editura: Elsevier Inc
Public țintă
Professionals (Network Administrators, IT Managers, Security Managers, Security Analysts, Directors of Security, etc.) IT Security Professionals (Security Auditors, Security Engineers, Compliance Specialists, etc.).Cuprins
Chapter 1. Intrusion Analysis Methodology
Chapter 2. Intrusion Methodologies and Artifacts
Chapter 3. Incident Response
Chapter 4. Volatile Data Analysis
Chapter 5. Network Analysis
Chapter 6. Host-Based Analysis
Chapter 7. Malware Analysis
Chapter 8. Finalizing the Analysis
Chapter 2. Intrusion Methodologies and Artifacts
Chapter 3. Incident Response
Chapter 4. Volatile Data Analysis
Chapter 5. Network Analysis
Chapter 6. Host-Based Analysis
Chapter 7. Malware Analysis
Chapter 8. Finalizing the Analysis
Recenzii
"Not only does this book teach you about network intrusion analysis, it also gives you knowledge of how intrusions are performed. This inside information helps give you a better picture of what's really going on when you are investigating a compromise." --Derrick Rountree, CISSP, CASP, MCSE