Network intrusion analysis: methodologies, tools, and techniques for incident analysis and response
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Syngress
c2012
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes index Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full operation. Network Intrusion Analysis teaches the reader about the various tools and techniques to use during a network intrusion investigation. The book focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns. This is the first book that provides such a thorough analysis of network intrusion investigation and response. Network Intrusion Analysis addresses the entire process of investigating a network intrusion by: Providing a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion. Providing real-world examples of network intrusions, along with associated workarounds. Walking you through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation. Network Intrusion Analysis addresses the entire process of investigating a network intrusion. Provides a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion. Provides real-world examples of network intrusions, along with associated workarounds. Walks readers through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (1 online resource) |
ISBN: | 9781597499620 1597499625 9781597499712 1597499714 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042305247 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781597499620 |9 978-1-59749-962-0 | ||
020 | |a 1597499625 |9 1-59749-962-5 | ||
020 | |a 9781597499712 |9 978-1-59749-971-2 | ||
020 | |a 1597499714 |9 1-59749-971-4 | ||
035 | |a (ZDB-33-EBS)ocn815518159 | ||
035 | |a (OCoLC)815518159 | ||
035 | |a (DE-599)BVBBV042305247 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Fichera, Joe |e Verfasser |4 aut | |
245 | 1 | 0 | |a Network intrusion analysis |b methodologies, tools, and techniques for incident analysis and response |c Joe Fichera, Steven Bolt |
264 | 1 | |a Waltham, MA |b Syngress |c c2012 | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full operation. Network Intrusion Analysis teaches the reader about the various tools and techniques to use during a network intrusion investigation. The book focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns. This is the first book that provides such a thorough analysis of network intrusion investigation and response. | ||
500 | |a Network Intrusion Analysis addresses the entire process of investigating a network intrusion by: Providing a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion. Providing real-world examples of network intrusions, along with associated workarounds. Walking you through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation. Network Intrusion Analysis addresses the entire process of investigating a network intrusion. Provides a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion. Provides real-world examples of network intrusions, along with associated workarounds. | ||
500 | |a Walks readers through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a Computer crimes / Investigation / United States |2 local | |
650 | 7 | |a Intrusion detection systems (Computer security) |2 local | |
650 | 7 | |a Computer security |2 local | |
650 | 7 | |a Computer networks / Security measures |2 local | |
650 | 7 | |a Internet / Security measures |2 local | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer networks |x Access control | |
650 | 4 | |a Computer crimes |x Investigation | |
651 | 4 | |a USA | |
653 | |a Electronic books | ||
700 | 1 | |a Bolt, Steven |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597499620 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027742239 |
Datensatz im Suchindex
_version_ | 1804152888128176128 |
---|---|
any_adam_object | |
author | Fichera, Joe |
author_facet | Fichera, Joe |
author_role | aut |
author_sort | Fichera, Joe |
author_variant | j f jf |
building | Verbundindex |
bvnumber | BV042305247 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn815518159 (OCoLC)815518159 (DE-599)BVBBV042305247 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03896nmm a2200553zc 4500</leader><controlfield tag="001">BV042305247</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499620</subfield><subfield code="9">978-1-59749-962-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499625</subfield><subfield code="9">1-59749-962-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499712</subfield><subfield code="9">978-1-59749-971-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499714</subfield><subfield code="9">1-59749-971-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn815518159</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)815518159</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305247</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Fichera, Joe</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network intrusion analysis</subfield><subfield code="b">methodologies, tools, and techniques for incident analysis and response</subfield><subfield code="c">Joe Fichera, Steven Bolt</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full operation. Network Intrusion Analysis teaches the reader about the various tools and techniques to use during a network intrusion investigation. The book focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns. This is the first book that provides such a thorough analysis of network intrusion investigation and response. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Network Intrusion Analysis addresses the entire process of investigating a network intrusion by: Providing a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion. Providing real-world examples of network intrusions, along with associated workarounds. Walking you through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation. Network Intrusion Analysis addresses the entire process of investigating a network intrusion. Provides a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion. Provides real-world examples of network intrusions, along with associated workarounds. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Walks readers through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation / United States</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Intrusion detection systems (Computer security)</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bolt, Steven</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597499620</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742239</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV042305247 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:52Z |
institution | BVB |
isbn | 9781597499620 1597499625 9781597499712 1597499714 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027742239 |
oclc_num | 815518159 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Syngress |
record_format | marc |
spelling | Fichera, Joe Verfasser aut Network intrusion analysis methodologies, tools, and techniques for incident analysis and response Joe Fichera, Steven Bolt Waltham, MA Syngress c2012 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier Includes index Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full operation. Network Intrusion Analysis teaches the reader about the various tools and techniques to use during a network intrusion investigation. The book focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns. This is the first book that provides such a thorough analysis of network intrusion investigation and response. Network Intrusion Analysis addresses the entire process of investigating a network intrusion by: Providing a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion. Providing real-world examples of network intrusions, along with associated workarounds. Walking you through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation. Network Intrusion Analysis addresses the entire process of investigating a network intrusion. Provides a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion. Provides real-world examples of network intrusions, along with associated workarounds. Walks readers through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation Includes bibliographical references and index Computer crimes / Investigation / United States local Intrusion detection systems (Computer security) local Computer security local Computer networks / Security measures local Internet / Security measures local Computer networks Security measures Computer networks Access control Computer crimes Investigation USA Electronic books Bolt, Steven Sonstige oth http://www.sciencedirect.com/science/book/9781597499620 Verlag Volltext |
spellingShingle | Fichera, Joe Network intrusion analysis methodologies, tools, and techniques for incident analysis and response Computer crimes / Investigation / United States local Intrusion detection systems (Computer security) local Computer security local Computer networks / Security measures local Internet / Security measures local Computer networks Security measures Computer networks Access control Computer crimes Investigation |
title | Network intrusion analysis methodologies, tools, and techniques for incident analysis and response |
title_auth | Network intrusion analysis methodologies, tools, and techniques for incident analysis and response |
title_exact_search | Network intrusion analysis methodologies, tools, and techniques for incident analysis and response |
title_full | Network intrusion analysis methodologies, tools, and techniques for incident analysis and response Joe Fichera, Steven Bolt |
title_fullStr | Network intrusion analysis methodologies, tools, and techniques for incident analysis and response Joe Fichera, Steven Bolt |
title_full_unstemmed | Network intrusion analysis methodologies, tools, and techniques for incident analysis and response Joe Fichera, Steven Bolt |
title_short | Network intrusion analysis |
title_sort | network intrusion analysis methodologies tools and techniques for incident analysis and response |
title_sub | methodologies, tools, and techniques for incident analysis and response |
topic | Computer crimes / Investigation / United States local Intrusion detection systems (Computer security) local Computer security local Computer networks / Security measures local Internet / Security measures local Computer networks Security measures Computer networks Access control Computer crimes Investigation |
topic_facet | Computer crimes / Investigation / United States Intrusion detection systems (Computer security) Computer security Computer networks / Security measures Internet / Security measures Computer networks Security measures Computer networks Access control Computer crimes Investigation USA |
url | http://www.sciencedirect.com/science/book/9781597499620 |
work_keys_str_mv | AT ficherajoe networkintrusionanalysismethodologiestoolsandtechniquesforincidentanalysisandresponse AT boltsteven networkintrusionanalysismethodologiestoolsandtechniquesforincidentanalysisandresponse |