Learning Network Forensics

Learning Network Forensics

English | 29 Feb. 2016 | ISBN: 1782174907 | 274 Pages | AZW3/MOBI/EPUB/PDF (conv) | 56.19 MB

We live in a highly networked world. Every digital device-phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to catch miscreants on the network.

Key Features

Lay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network traffic
Connect the dots by understanding web proxies, firewalls, and routers to close in on your suspect
A hands-on guide to help you solve your case with malware forensic methods and network behaviors

Book Description

The book starts with an introduction to the world of network forensics and investigations. You will begin by getting an understanding of how to gather both physical and virtual evidence, intercepting and analyzing network data, wireless data packets, investigating intrusions, and so on. You will further explore the technology, tools, and investigating methods using malware forensics, network tunneling, and behaviors. By the end of the book, you will gain a complete understanding of how to successfully close a case.

What you will learn

Understand Internetworking, sources of network-based evidence and other basic technical fundamentals, including the tools that will be used throughout the book
Acquire evidence using traffic acquisition software and know how to manage and handle the evidence
Perform packet analysis by capturing and collecting data, along with content analysis
Locate wireless devices, as well as capturing and analyzing wireless traffic data packets
Implement protocol analysis and content matching; acquire evidence from NIDS/NIPS
Act upon the data and evidence gathered by being able to connect the dots and draw links between various events
Apply logging and interfaces, along with analyzing web proxies and understanding encrypted web traffic
Use IOCs (Indicators of Compromise) and build real-world forensic solutions, dealing with malware

About the Author

Samir Datt has been dabbling with digital investigations since 1988, which was around the time he solved his first case with the help of an old PC and Lotus 123. He is the Founder CEO of Foundation Futuristic Technologies (P) Ltd, better known as ForensicsGuru.com. He is widely credited with evangelizing computer forensics in the Indian subcontinent and has personally trained thousands of law enforcement officers in the area. He has the distinction of starting the computer forensics industry in South Asia and setting up India's first computer forensic lab in the private sector. He is consulted by law enforcement agencies and private sector on various technology-related investigative issues. He has extensive experience in training thousands of investigators as well as examining a large number of digital sources of evidence in both private and government investigations.

Table of Contents

Becoming Network 007s
Laying Hands on the Evidence
Capturing & Analyzing Data Packets
Going Wireless
Tracking an Intruder on the Network
Connecting the Dots - Event Logs
Proxies, Firewalls, and Routers
Smuggling Forbidden Protocols - Network Tunneling
Investigating Malware - Cyber Weapons of the Internet
Closing the Deal - Solving the Case



[Fast Download] Learning Network Forensics

Ebooks related to "Learning Network Forensics" :
Human and Automatic Speaker Recognition over Telecommunication Channels
Heterogeneous Vehicular Networks
Toward 5G Software Defined Radio Receiver Front-Ends
Intro RF Propagation
Advances in Neural Networks
Visible Light Communication
Voice Compression and Communications: Principles and Applications for Fixed and Wireless Channels
Intelligent Interactive Multimedia Systems and Services in Practice
Software Engineering: Architecture-driven Software Development
UMTS: The Fundamentals
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.