Fr. 157.00

Fundamentals of Network Forensics - A Research Perspective

English · Hardback

Shipping usually within 2 to 3 weeks (title will be printed to order)

Description

Read more

This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the functioning of the Internet and its core protocols. This, in turn, enables the identification of shortcomings and highlights where improvements can be made for a more secure network. Topics and features: provides learning objectives in every chapter, and review questions throughout the book to test understanding; introduces the basic concepts of network process models, network forensics frameworks and network forensics tools; discusses various techniques for the acquisition of packets in a network forensics system, network forensics analysis, and attribution in network forensics; examines a range of advanced topics, including botnet, smartphone, and cloud forensics; reviews a number of freely available tools for performing forensic activities.

List of contents

Part I: Fundamentals.- Introduction.- Network Forensic Process Models.- Network Forensic Frameworks.- Network Forensics Tools.- Part II: Techniques.- Acquisition.- Network Forensic Analysis.- Attribution.- Part III: Advances.- Botnet Forensics.- Smartphone Forensics.- Cloud Forensics.

About the author

Prof. Ramesh Chandra Joshi is the Chancellor of Graphic Era University, Dehradun, India. He was formerly a Professor in the Department of Electronics and Computer Engineering at the Indian Institute of Technology Roorkee, India.

Dr. Emmanuel Shubhakar Pilli is an Assistant Professor in the Department of Computer Science and Engineering at Malaviya National Institute of Technology, Jaipur, India.

Summary

This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the functioning of the Internet and its core protocols. This, in turn, enables the identification of shortcomings and highlights where improvements can be made for a more secure network. Topics and features: provides learning objectives in every chapter, and review questions throughout the book to test understanding; introduces the basic concepts of network process models, network forensics frameworks and network forensics tools; discusses various techniques for the acquisition of packets in a network forensics system, network forensics analysis, and attribution in network forensics; examines a range of advanced topics, including botnet, smartphone, and cloud forensics; reviews a number of freely available tools for performing forensic activities.

Product details

Authors R Joshi, R C Joshi, R. C. Joshi, R.C. Joshi, Emmanuel S Pilli, Emmanuel S. Pilli
Publisher Springer, Berlin
 
Languages English
Product format Hardback
Released 31.12.2016
 
EAN 9781447172970
ISBN 978-1-4471-7297-0
No. of pages 214
Dimensions 162 mm x 16 mm x 242 mm
Weight 534 g
Illustrations XV, 214 p. 82 illus., 1 illus. in color.
Series Current Clinical Neurology
Computer Communications and Networks
Computer Communications and Networks
Computer Communications and Ne
Subjects Natural sciences, medicine, IT, technology > IT, data processing > Data communication, networks

B, computer science, Systems and Data Security, Data and Information Security, Computer Communication Networks, Network Security, Computer security, Computer communication systems

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.