000 03670nam a22004815i 4500
001 978-1-4471-7299-4
003 DE-He213
005 20200421112225.0
007 cr nn 008mamaa
008 161128s2016 xxk| s |||| 0|eng d
020 _a9781447172994
_9978-1-4471-7299-4
024 7 _a10.1007/978-1-4471-7299-4
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
100 1 _aJoshi, R.C.
_eauthor.
245 1 0 _aFundamentals of Network Forensics
_h[electronic resource] :
_bA Research Perspective /
_cby R.C. Joshi, Emmanuel S. Pilli.
264 1 _aLondon :
_bSpringer London :
_bImprint: Springer,
_c2016.
300 _aXV, 214 p. 82 illus., 1 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aComputer Communications and Networks,
_x1617-7975
505 0 _aPart I: Fundamentals -- Introduction -- Network Forensic Process Models -- Network Forensic Frameworks -- Network Forensics Tools -- Part II: Techniques -- Acquisition -- Network Forensic Analysis -- Attribution -- Part III: Advances -- Botnet Forensics -- Smartphone Forensics -- Cloud Forensics.
520 _aThis timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the functioning of the Internet and its core protocols. This, in turn, enables the identification of shortcomings and highlights where improvements can be made for a more secure network. Topics and features: Provides learning objectives in every chapter, and review questions throughout the book to test understanding Introduces the basic concepts of network process models, network forensics frameworks and network forensics tools Discusses various techniques for the acquisition of packets in a network forensics system, network forensics analysis, and attribution in network forensics Examines a range of advanced topics, including botnet forensics, smartphone forensics, and cloud forensics Reviews a number of freely available and easily installable tools for performing forensic activities Researchers and students of network forensics will find this accessible work to provide an ideal technical foundation to the field. The focus on practically useful techniques and tools will also appeal to professional network forensic analysts involved in legal investigations. Prof. Ramesh Chandra Joshi is the Chancellor of Graphic Era University, Dehradun, India. He was formerly a Professor in the Department of Electronics and Computer Engineering at the Indian Institute of Technology Roorkee, India. Dr. Emmanuel Shubhakar Pilli is an Assistant Professor in the Department of Computer Science and Engineering at Malaviya National Institute of Technology, Jaipur, India.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aSystems and Data Security.
700 1 _aPilli, Emmanuel S.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781447172970
830 0 _aComputer Communications and Networks,
_x1617-7975
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4471-7299-4
912 _aZDB-2-SCS
942 _cEBK
999 _c57608
_d57608