Fundamentals of Network Forensics (Record no. 57608)

000 -LEADER
fixed length control field 03670nam a22004815i 4500
001 - CONTROL NUMBER
control field 978-1-4471-7299-4
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421112225.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 161128s2016 xxk| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781447172994
-- 978-1-4471-7299-4
082 04 - CLASSIFICATION NUMBER
Call Number 004.6
100 1# - AUTHOR NAME
Author Joshi, R.C.
245 10 - TITLE STATEMENT
Title Fundamentals of Network Forensics
Sub Title A Research Perspective /
300 ## - PHYSICAL DESCRIPTION
Number of Pages XV, 214 p. 82 illus., 1 illus. in color.
490 1# - SERIES STATEMENT
Series statement Computer Communications and Networks,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Part I: Fundamentals -- Introduction -- Network Forensic Process Models -- Network Forensic Frameworks -- Network Forensics Tools -- Part II: Techniques -- Acquisition -- Network Forensic Analysis -- Attribution -- Part III: Advances -- Botnet Forensics -- Smartphone Forensics -- Cloud Forensics.
520 ## - SUMMARY, ETC.
Summary, etc This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the functioning of the Internet and its core protocols. This, in turn, enables the identification of shortcomings and highlights where improvements can be made for a more secure network. Topics and features: Provides learning objectives in every chapter, and review questions throughout the book to test understanding Introduces the basic concepts of network process models, network forensics frameworks and network forensics tools Discusses various techniques for the acquisition of packets in a network forensics system, network forensics analysis, and attribution in network forensics Examines a range of advanced topics, including botnet forensics, smartphone forensics, and cloud forensics Reviews a number of freely available and easily installable tools for performing forensic activities Researchers and students of network forensics will find this accessible work to provide an ideal technical foundation to the field. The focus on practically useful techniques and tools will also appeal to professional network forensic analysts involved in legal investigations. Prof. Ramesh Chandra Joshi is the Chancellor of Graphic Era University, Dehradun, India. He was formerly a Professor in the Department of Electronics and Computer Engineering at the Indian Institute of Technology Roorkee, India. Dr. Emmanuel Shubhakar Pilli is an Assistant Professor in the Department of Computer Science and Engineering at Malaviya National Institute of Technology, Jaipur, India.
700 1# - AUTHOR 2
Author 2 Pilli, Emmanuel S.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4471-7299-4
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- London :
-- Springer London :
-- Imprint: Springer,
-- 2016.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer communication systems.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1617-7975
912 ## -
-- ZDB-2-SCS

No items available.