Hands-on network forensics : (Record no. 21071)

MARC details
000 -LEADER
fixed length control field 01851nam a2200217Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250520103012.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250520s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781789344523
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK 5105.59 .J37 2019
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Jaswal, Nipun
Relator term author
245 #0 - TITLE STATEMENT
Title Hands-on network forensics :
Remainder of title investigate network attacks and find evidence using common network forensic tools /
Statement of responsibility, etc. Nipun Jaswal
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Birmingham, UK :
Name of publisher, distributor, etc. Packt Publishing, Limited,
Date of publication, distribution, etc. c2019
300 ## - PHYSICAL DESCRIPTION
Extent 346 pages :
Other physical details illustrations ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1. Introduction to Network Forensics -- Chapter 2. Technical Concepts and Acquiring Evidence -- Chapter 3. Deep Packet Inspection -- Chapter 4. Statistical flow analysis -- Chapter 5. Combating Tunneling and Encryption -- Chapter 6. Investigating Good, Known and the Ugly Malware -- Chapter 7.Investigating C2 Servers -- Chapter 8. Investigating and Analyzing Logs -- Chapter 9. WLAN Forensics -- Chapter 10. Automated Evidence Aggregation and Analysis.
520 ## - SUMMARY, ETC.
Summary, etc. Gain basic skills in network forensics and learn how to apply them effectively Key Features Investigate network threats with ease Practice forensics tasks such as intrusion detection, network analysis, and scanning Learn forensics investigation at the network level Book Description Network forensics is a subset of digital forensics that deals with network attacks and their investigation. In the era of network attacks and malware threat, it's now more important than ever to have skills to investigate network attacks and vulnerabilities. Hands-On Network Forensics starts with the core concepts within network forensics, including coding, networking, forensics tools, and methodologies for forensic investigations.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER SECURITY
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Gen. Ed. - CCIT LRC - Main National University - Manila General Circulation 01/12/2023 Donation   GC TK 5105.59 .J37 2019 c.2 NULIB000018830 05/20/2025 c.2 05/20/2025 Books

© 2021 NU LRC. All rights reserved.Privacy Policy I Powered by: KOHA