The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry ...
Digital Forensics for Network, Internet, and Cloud Computing
A Forensic Evidence Guide for Moving Targets and Data
Network forensics is an evolution of typical digital forensics, in which evidence is gathered from network traffic in near real time. This book will help security and forensics professionals as well as network administrators build a solid foundation of processes and controls to identify incidents and gather evidence from the network. Forensic scientists and investigators are some of the fastest growing jobs in the United States with over 70,000 individuals employed in 2008. Specifically in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10,000 qualified specialists. Almost every technology company has developed or is developing a cloud computing strategy. To cut costs, many companies are moving toward network-based applications like SalesForce.com, PeopleSoft, and HR Direct. Every day, we are moving companies’ proprietary data into a cloud, which can be hosted anywhere in the world. These companies need to understand how to identify where their data is going and what they are sending.
- Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic analysis, and deciphering TCP/IP.
- The current and future states of network forensics analysis tools are addressed.
- The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation.
368 pages; ISBN 9781597495387
, or download in or
Visual Basic in Easy Steps 2011 US$ 14.99 193 pages
Using Google Maps and Google Earth 2011 US$ 19.99 360 pages
A Practical Guide to Linux Commands, Editors, and Shell Programming, 3e 2012 US$ 39.99 1224 pages
HTML and CSS 2011 US$ 29.99 514 pages
- Academic > Public Affairs > Criminal justice administration > Police. Detectives. Constabulary > Police duty. Methods of protection > Investigation of crimes. Examination and identification of prisoners
- Academic > Sociology > Social pathology. Social and public welfare. Criminology > Criminal justice administration > Police. Detectives. Constabulary > Police duty. Methods of protection
- Computers > Networking
- Computers > Security