Digital forensics for network, Internet, and cloud computing: a forensic evidence guide for moving targets and data
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress
©2010
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes index Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies. With the explosive growth in Internet-based technology (e.g., social networks, cloud computing, telecommuting), computer and network forensics investigators are among the fastest areas of growth. Specifically, in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10K qualified specialists. Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic analysis, and deciphering TCP/IP. The current and future states of network forensics analysis tools are addressed. The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation |
Beschreibung: | 1 Online-Ressource (xii, 353 pages) |
ISBN: | 9781597495387 1597495387 9781597495370 1597495379 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV042300695 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2010 xx o|||| 00||| eng d | ||
020 | |a 9781597495387 |c electronic bk. |9 978-1-59749-538-7 | ||
020 | |a 1597495387 |c electronic bk. |9 1-59749-538-7 | ||
020 | |a 9781597495370 |9 978-1-59749-537-0 | ||
020 | |a 1597495379 |9 1-59749-537-9 | ||
035 | |a (OCoLC)647765304 | ||
035 | |a (DE-599)BVBBV042300695 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 363.250285/4678 |2 22 | |
245 | 1 | 0 | |a Digital forensics for network, Internet, and cloud computing |b a forensic evidence guide for moving targets and data |c Terrence V. Lillard [and others] ; technical editor, Jim Murray |
264 | 1 | |a Burlington, MA |b Syngress |c ©2010 | |
300 | |a 1 Online-Ressource (xii, 353 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies. With the explosive growth in Internet-based technology (e.g., social networks, cloud computing, telecommuting), computer and network forensics investigators are among the fastest areas of growth. Specifically, in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10K qualified specialists. Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic analysis, and deciphering TCP/IP. The current and future states of network forensics analysis tools are addressed. The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation | ||
650 | 4 | |a Computer crimes / Investigation | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Cloud computing / Security measures | |
650 | 7 | |a LAW / Forensic Science |2 bisacsh | |
650 | 4 | |a Computer crimes |x Investigation | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Cloud computing |x Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
689 | 2 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | |8 3\p |5 DE-604 | |
700 | 1 | |a Lillard, Terrence |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597495370 |x Verlag |3 Volltext |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-33-ESD | ||
912 | |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027737687 |
Datensatz im Suchindex
_version_ | 1825766767261122560 |
---|---|
adam_text | |
any_adam_object | |
building | Verbundindex |
bvnumber | BV042300695 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)647765304 (DE-599)BVBBV042300695 |
dewey-full | 363.250285/4678 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.250285/4678 |
dewey-search | 363.250285/4678 |
dewey-sort | 3363.250285 44678 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV042300695</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2010 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495387</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-538-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495387</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-538-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495370</subfield><subfield code="9">978-1-59749-537-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495379</subfield><subfield code="9">1-59749-537-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)647765304</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042300695</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.250285/4678</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital forensics for network, Internet, and cloud computing</subfield><subfield code="b">a forensic evidence guide for moving targets and data</subfield><subfield code="c">Terrence V. Lillard [and others] ; technical editor, Jim Murray</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">©2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 353 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies. With the explosive growth in Internet-based technology (e.g., social networks, cloud computing, telecommuting), computer and network forensics investigators are among the fastest areas of growth. Specifically, in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10K qualified specialists. Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic analysis, and deciphering TCP/IP. The current and future states of network forensics analysis tools are addressed. The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW / Forensic Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lillard, Terrence</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597495370</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027737687</subfield></datafield></record></collection> |
id | DE-604.BV042300695 |
illustrated | Not Illustrated |
indexdate | 2025-03-05T15:01:13Z |
institution | BVB |
isbn | 9781597495387 1597495387 9781597495370 1597495379 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027737687 |
oclc_num | 647765304 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xii, 353 pages) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Syngress |
record_format | marc |
spelling | Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data Terrence V. Lillard [and others] ; technical editor, Jim Murray Burlington, MA Syngress ©2010 1 Online-Ressource (xii, 353 pages) txt rdacontent c rdamedia cr rdacarrier Includes index Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies. With the explosive growth in Internet-based technology (e.g., social networks, cloud computing, telecommuting), computer and network forensics investigators are among the fastest areas of growth. Specifically, in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10K qualified specialists. Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic analysis, and deciphering TCP/IP. The current and future states of network forensics analysis tools are addressed. The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation Computer crimes / Investigation Computer security Computer networks / Security measures Cloud computing / Security measures LAW / Forensic Science bisacsh Computer crimes Investigation Computer networks Security measures Cloud computing Security measures Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 s 1\p DE-604 Rechnernetz (DE-588)4070085-9 s 2\p DE-604 Datensicherung (DE-588)4011144-1 s 3\p DE-604 Lillard, Terrence Sonstige oth http://www.sciencedirect.com/science/book/9781597495370 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data Computer crimes / Investigation Computer security Computer networks / Security measures Cloud computing / Security measures LAW / Forensic Science bisacsh Computer crimes Investigation Computer networks Security measures Cloud computing Security measures Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computerkriminalität (DE-588)4010452-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4010452-7 |
title | Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data |
title_auth | Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data |
title_exact_search | Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data |
title_full | Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data Terrence V. Lillard [and others] ; technical editor, Jim Murray |
title_fullStr | Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data Terrence V. Lillard [and others] ; technical editor, Jim Murray |
title_full_unstemmed | Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data Terrence V. Lillard [and others] ; technical editor, Jim Murray |
title_short | Digital forensics for network, Internet, and cloud computing |
title_sort | digital forensics for network internet and cloud computing a forensic evidence guide for moving targets and data |
title_sub | a forensic evidence guide for moving targets and data |
topic | Computer crimes / Investigation Computer security Computer networks / Security measures Cloud computing / Security measures LAW / Forensic Science bisacsh Computer crimes Investigation Computer networks Security measures Cloud computing Security measures Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computerkriminalität (DE-588)4010452-7 gnd |
topic_facet | Computer crimes / Investigation Computer security Computer networks / Security measures Cloud computing / Security measures LAW / Forensic Science Computer crimes Investigation Computer networks Security measures Cloud computing Security measures Datensicherung Rechnernetz Computerkriminalität |
url | http://www.sciencedirect.com/science/book/9781597495370 |
work_keys_str_mv | AT lillardterrence digitalforensicsfornetworkinternetandcloudcomputingaforensicevidenceguideformovingtargetsanddata |