Investigating the cyber breach : The digital forensics guide for the network engineer
By: Muniz, Joseph.
Contributor(s): Lakhani, Aamir.
Series: Networking Technology: Security Series - CISCO. Publisher: Noida Pearson Education 2019Description: xx, 444p. | Binding - Paperback | 23.5*17 cm.ISBN: 9789353068462.Subject(s): EXTC EngineeringDDC classification: 005.8 Summary: Breach detection is one of the hottest topics in cyber security. As more devices become Internet capable, more systems become targets. This in turn increases the need for digital defenses meaning the intended audience will continue to grow and expand across all business sectors. This book is a guide for various levels of technical competencies. Business minded people and executives would benefit from the incident response and policy content. Network administrators will benefit from the breach detection best practices content. Security experts will benefit from the technical forensics tools and exercises. Unlike the very few books on this topic, this book will be developed as a guide that can be easily applied to any organization's business practice. Table of Content Chapter 1 Digital Forensics Chapter 2 Cybercrime and Defenses Chapter 3 Building a Digital Forensics Lab Chapter 4 Responding to a Breach Chapter 5 Investigations Chapter 6 Collecting and Preserving Evidence Chapter 7 Endpoint Forensics Chapter 8 Network Forensics Chapter 9 Mobile Forensics Chapter 10 Email and Social Media Chapter 11 Cisco Forensic Capabilities Chapter 12 Forensic Case Studies Chapter 13 Forensic Tools Salient Features This book will help administrators 1) Understand how to identify when they are compromised. 2) Improve their network security 3) Develop a incident response plan 4) Maximize security capabilities in existing investments 5) Learn how to use critical digital forensics tools 6) Understand best practices for digital forensics."Item type | Current location | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
Text Books | School of Engineering & Technology Reference Section | Reference | 005.8 MUN/LAK (Browse shelf) | Available | E15202 |
Breach detection is one of the hottest topics in cyber security. As more devices become Internet capable, more systems become targets. This in turn increases the need for digital defenses meaning the intended audience will continue to grow and expand across all business sectors. This book is a guide for various levels of technical competencies. Business minded people and executives would benefit from the incident response and policy content. Network administrators will benefit from the breach detection best practices content. Security experts will benefit from the technical forensics tools and exercises. Unlike the very few books on this topic, this book will be developed as a guide that can be easily applied to any organization's business practice.
Table of Content
Chapter 1 Digital Forensics
Chapter 2 Cybercrime and Defenses
Chapter 3 Building a Digital Forensics Lab
Chapter 4 Responding to a Breach
Chapter 5 Investigations
Chapter 6 Collecting and Preserving Evidence
Chapter 7 Endpoint Forensics
Chapter 8 Network Forensics
Chapter 9 Mobile Forensics
Chapter 10 Email and Social Media
Chapter 11 Cisco Forensic Capabilities
Chapter 12 Forensic Case Studies
Chapter 13 Forensic Tools
Salient Features
This book will help administrators
1) Understand how to identify when they are compromised.
2) Improve their network security
3) Develop a incident response plan
4) Maximize security capabilities in existing investments
5) Learn how to use critical digital forensics tools
6) Understand best practices for digital forensics."
There are no comments for this item.