Fundamentals of Network Forensics

A Research Perspective

Nonfiction, Computers, Networking & Communications, Hardware, Computer Security, General Computing
Cover of the book Fundamentals of Network Forensics by R.C. Joshi, Emmanuel S. Pilli, Springer London
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: R.C. Joshi, Emmanuel S. Pilli ISBN: 9781447172994
Publisher: Springer London Publication: November 25, 2016
Imprint: Springer Language: English
Author: R.C. Joshi, Emmanuel S. Pilli
ISBN: 9781447172994
Publisher: Springer London
Publication: November 25, 2016
Imprint: Springer
Language: English

This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the functioning of the Internet and its core protocols. This, in turn, enables the identification of shortcomings and highlights where improvements can be made for a more secure network. Topics and features: provides learning objectives in every chapter, and review questions throughout the book to test understanding; introduces the basic concepts of network process models, network forensics frameworks and network forensics tools; discusses various techniques for the acquisition of packets in a network forensics system, network forensics analysis, and attribution in network forensics; examines a range of advanced topics, including botnet, smartphone, and cloud forensics; reviews a number of freely available tools for performing forensic activities.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the functioning of the Internet and its core protocols. This, in turn, enables the identification of shortcomings and highlights where improvements can be made for a more secure network. Topics and features: provides learning objectives in every chapter, and review questions throughout the book to test understanding; introduces the basic concepts of network process models, network forensics frameworks and network forensics tools; discusses various techniques for the acquisition of packets in a network forensics system, network forensics analysis, and attribution in network forensics; examines a range of advanced topics, including botnet, smartphone, and cloud forensics; reviews a number of freely available tools for performing forensic activities.

More books from Springer London

Cover of the book Nutrition and Ventilatory Function by R.C. Joshi, Emmanuel S. Pilli
Cover of the book Guide to Software Development by R.C. Joshi, Emmanuel S. Pilli
Cover of the book Atlas of Fine Needle Aspiration Cytology by R.C. Joshi, Emmanuel S. Pilli
Cover of the book Occupational Cancers by R.C. Joshi, Emmanuel S. Pilli
Cover of the book Falling Liquid Films by R.C. Joshi, Emmanuel S. Pilli
Cover of the book Mathematics for Computer Graphics by R.C. Joshi, Emmanuel S. Pilli
Cover of the book Cloud Computing by R.C. Joshi, Emmanuel S. Pilli
Cover of the book Regulation of the Power Sector by R.C. Joshi, Emmanuel S. Pilli
Cover of the book Handbook of Angioplasty and Stenting Procedures by R.C. Joshi, Emmanuel S. Pilli
Cover of the book Guide to Computing for Expressive Music Performance by R.C. Joshi, Emmanuel S. Pilli
Cover of the book Informatics and Management Science VI by R.C. Joshi, Emmanuel S. Pilli
Cover of the book Side Effects of Medical Cancer Therapy by R.C. Joshi, Emmanuel S. Pilli
Cover of the book Nuclear Medicine Radiation Dosimetry by R.C. Joshi, Emmanuel S. Pilli
Cover of the book Fish Oil and Vascular Disease by R.C. Joshi, Emmanuel S. Pilli
Cover of the book Case Based Echocardiography by R.C. Joshi, Emmanuel S. Pilli
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy