Fundamentals of Network Forensics A Research Perspective /

This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the functioning of the Internet and its cor...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Joshi, R.C (Συγγραφέας), Pilli, Emmanuel S. (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: London : Springer London : Imprint: Springer, 2016.
Σειρά:Computer Communications and Networks,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03669nam a22004695i 4500
001 978-1-4471-7299-4
003 DE-He213
005 20161129021253.0
007 cr nn 008mamaa
008 161128s2016 xxk| s |||| 0|eng d
020 |a 9781447172994  |9 978-1-4471-7299-4 
024 7 |a 10.1007/978-1-4471-7299-4  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
100 1 |a Joshi, R.C.  |e author. 
245 1 0 |a Fundamentals of Network Forensics  |h [electronic resource] :  |b A Research Perspective /  |c by R.C. Joshi, Emmanuel S. Pilli. 
264 1 |a London :  |b Springer London :  |b Imprint: Springer,  |c 2016. 
300 |a XV, 214 p. 82 illus., 1 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Computer Communications and Networks,  |x 1617-7975 
505 0 |a Part I: Fundamentals -- Introduction -- Network Forensic Process Models -- Network Forensic Frameworks -- Network Forensics Tools -- Part II: Techniques -- Acquisition -- Network Forensic Analysis -- Attribution -- Part III: Advances -- Botnet Forensics -- Smartphone Forensics -- Cloud Forensics. 
520 |a This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the functioning of the Internet and its core protocols. This, in turn, enables the identification of shortcomings and highlights where improvements can be made for a more secure network. Topics and features: Provides learning objectives in every chapter, and review questions throughout the book to test understanding Introduces the basic concepts of network process models, network forensics frameworks and network forensics tools Discusses various techniques for the acquisition of packets in a network forensics system, network forensics analysis, and attribution in network forensics Examines a range of advanced topics, including botnet forensics, smartphone forensics, and cloud forensics Reviews a number of freely available and easily installable tools for performing forensic activities Researchers and students of network forensics will find this accessible work to provide an ideal technical foundation to the field. The focus on practically useful techniques and tools will also appeal to professional network forensic analysts involved in legal investigations. Prof. Ramesh Chandra Joshi is the Chancellor of Graphic Era University, Dehradun, India. He was formerly a Professor in the Department of Electronics and Computer Engineering at the Indian Institute of Technology Roorkee, India. Dr. Emmanuel Shubhakar Pilli is an Assistant Professor in the Department of Computer Science and Engineering at Malaviya National Institute of Technology, Jaipur, India. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Systems and Data Security. 
700 1 |a Pilli, Emmanuel S.  |e author. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781447172970 
830 0 |a Computer Communications and Networks,  |x 1617-7975 
856 4 0 |u http://dx.doi.org/10.1007/978-1-4471-7299-4  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)