{"product_id":"hands-on-network-forensics-investigate-network-attacks-and-find-evidence-using-common-network-forensic-tools-paperback","title":"Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensic tools - Paperback","description":"\u003cp\u003eby \u003cb\u003eNipun Jaswal\u003c\/b\u003e (Author)\u003c\/p\u003e\u003cp\u003e\u003c\/p\u003e\u003cp\u003e\u003cstrong\u003eGain basic skills in network forensics and learn how to apply them effectively\u003c\/strong\u003e\u003c\/p\u003e \u003cp\u003e\u003cstrong\u003eKey Features\u003c\/strong\u003e\u003c\/p\u003e \u003cul\u003e \u003cli\u003eInvestigate network threats with ease\u003c\/li\u003e \u003cli\u003ePractice forensics tasks such as intrusion detection, network analysis, and scanning\u003c\/li\u003e \u003cli\u003eLearn forensics investigation at the network level\u003c\/li\u003e \u003c\/ul\u003e \u003cp\u003e\u003cstrong\u003eBook Description\u003c\/strong\u003e\u003c\/p\u003e \u003cp\u003eNetwork forensics is a subset of digital forensics that deals with network attacks and their investigation. In the era of network attacks and malware threat, it's now more important than ever to have skills to investigate network attacks and vulnerabilities.\u003c\/p\u003e \u003cp\u003eHands-On Network Forensics starts with the core concepts within network forensics, including coding, networking, forensics tools, and methodologies for forensic investigations. You'll then explore the tools used for network forensics, followed by understanding how to apply those tools to a PCAP file and write the accompanying report. In addition to this, you will understand how statistical flow analysis, network enumeration, tunneling and encryption, and malware detection can be used to investigate your network. Towards the end of this book, you will discover how network correlation works and how to bring all the information from different types of network devices together.\u003c\/p\u003e \u003cp\u003eBy the end of this book, you will have gained hands-on experience of performing forensics analysis tasks.\u003c\/p\u003e \u003cp\u003e\u003cstrong\u003eWhat you will learn\u003c\/strong\u003e\u003c\/p\u003e \u003cul\u003e \u003cli\u003eDiscover and interpret encrypted traffic\u003c\/li\u003e \u003cli\u003eLearn about various protocols\u003c\/li\u003e \u003cli\u003eUnderstand the malware language over wire\u003c\/li\u003e \u003cli\u003eGain insights into the most widely used malware\u003c\/li\u003e \u003cli\u003eCorrelate data collected from attacks\u003c\/li\u003e \u003cli\u003eDevelop tools and custom scripts for network forensics automation\u003c\/li\u003e \u003c\/ul\u003e\u003cdiv\u003e\n\u003cstrong\u003eNumber of Pages:\u003c\/strong\u003e 358\u003c\/div\u003e\u003cdiv\u003e\n\u003cstrong\u003eDimensions:\u003c\/strong\u003e 0.74 x 9.25 x 7.5 IN\u003c\/div\u003e\u003cdiv\u003e\n\u003cstrong\u003ePublication Date:\u003c\/strong\u003e March 30, 2019\u003c\/div\u003e","brand":"Books by splitShops","offers":[{"title":"Default Title","offer_id":47418857947314,"sku":"9781789344523","price":63.34,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0770\/3891\/1666\/files\/0f0b757bb0ac678cedc88876e1b4d507.webp?v=1778461671","url":"https:\/\/box.dadyminds.org\/products\/hands-on-network-forensics-investigate-network-attacks-and-find-evidence-using-common-network-forensic-tools-paperback","provider":"DADYMINDS BOX","version":"1.0","type":"link"}