SØG - mellem flere end 8 millioner bøger:

Søg på: Titel, forfatter, forlag - gerne i kombination.
Eller blot på isbn, hvis du kender dette.

Viser: Investigating the Cyber Breach - The Digital Forensics Guide for the Network Engineer

Investigating the Cyber Breach, 1. udgave

Investigating the Cyber Breach Vital Source e-bog

Joseph Muniz og Aamir Lakhani
(2018)
Pearson International
628,00 kr.
Leveres umiddelbart efter køb
Investigating the Cyber Breach, 1. udgave

Investigating the Cyber Breach Vital Source e-bog

Joseph Muniz og Aamir Lakhani
(2018)
Pearson International
367,00 kr.
Leveres umiddelbart efter køb
Investigating the Cyber Breach, 1. udgave

Investigating the Cyber Breach Vital Source e-bog

Joseph Muniz og Aamir Lakhani
(2018)
Pearson International
432,00 kr.
Leveres umiddelbart efter køb
Investigating the Cyber Breach, 1. udgave

Investigating the Cyber Breach Vital Source e-bog

Joseph Muniz og Aamir Lakhani
(2018)
Pearson International
299,00 kr.
Leveres umiddelbart efter køb
Investigating the Cyber Breach - The Digital Forensics Guide for the Network Engineer

Investigating the Cyber Breach

The Digital Forensics Guide for the Network Engineer
Joseph Muniz, Aamir Lakhani og Ron Taylor
(2018)
Sprog: Engelsk
Cisco Press
439,00 kr.
På lager, Bestil nu og få den leveret
om ca. 2 hverdage
  • Klik for at bedømme:
  • 0.0/6 (0 bedømmelser)

Detaljer om varen

  • 1. Udgave
  • Vital Source E-book
  • Udgiver: Pearson International (Januar 2018)
  • Forfattere: Joseph Muniz og Aamir Lakhani
  • ISBN: 9780134755816
Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer ·         Understand the realities of cybercrime and today’s attacks ·         Build a digital forensics lab to test tools and methods, and gain expertise ·         Take the right actions as soon as you discover a breach ·         Determine the full scope of an investigation and the role you’ll play ·         Properly collect, document, and preserve evidence and data ·         Collect and analyze data from PCs, Macs, IoT devices, and other endpoints ·         Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence ·         Analyze iOS and Android devices, and understand encryption-related obstacles to investigation ·         Investigate and trace email, and identify fraud or abuse ·         Use social media to investigate individuals or online identities ·         Gather, extract, and analyze breach data with Cisco tools and techniques ·         Walk through common breaches and responses from start to finish ·         Choose the right tool for each task, and explore alternatives that might also be helpful   The professional’s go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You’ll learn how to make the most of today’s best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving intelligence, rooting out dormant malware, and responding effectively to breaches underway right now. This book is part of the Networking Technology: Security Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.    
Licens varighed:
Online udgaven er tilgængelig: 365 dage fra købsdato.
Offline udgaven er tilgængelig: ubegrænset dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 1. Udgave
  • Vital Source leje e-bog 180 dage
  • Udgiver: Pearson International (Januar 2018)
  • Forfattere: Joseph Muniz og Aamir Lakhani
  • ISBN: 9780134755816R180
Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer ·         Understand the realities of cybercrime and today’s attacks ·         Build a digital forensics lab to test tools and methods, and gain expertise ·         Take the right actions as soon as you discover a breach ·         Determine the full scope of an investigation and the role you’ll play ·         Properly collect, document, and preserve evidence and data ·         Collect and analyze data from PCs, Macs, IoT devices, and other endpoints ·         Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence ·         Analyze iOS and Android devices, and understand encryption-related obstacles to investigation ·         Investigate and trace email, and identify fraud or abuse ·         Use social media to investigate individuals or online identities ·         Gather, extract, and analyze breach data with Cisco tools and techniques ·         Walk through common breaches and responses from start to finish ·         Choose the right tool for each task, and explore alternatives that might also be helpful   The professional’s go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You’ll learn how to make the most of today’s best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving intelligence, rooting out dormant malware, and responding effectively to breaches underway right now. This book is part of the Networking Technology: Security Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.    
Licens varighed:
Online udgaven er tilgængelig: 180 dage fra købsdato.
Offline udgaven er tilgængelig: 180 dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 1. Udgave
  • Vital Source leje e-bog 365 dage
  • Udgiver: Pearson International (Januar 2018)
  • Forfattere: Joseph Muniz og Aamir Lakhani
  • ISBN: 9780134755816R365
Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer ·         Understand the realities of cybercrime and today’s attacks ·         Build a digital forensics lab to test tools and methods, and gain expertise ·         Take the right actions as soon as you discover a breach ·         Determine the full scope of an investigation and the role you’ll play ·         Properly collect, document, and preserve evidence and data ·         Collect and analyze data from PCs, Macs, IoT devices, and other endpoints ·         Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence ·         Analyze iOS and Android devices, and understand encryption-related obstacles to investigation ·         Investigate and trace email, and identify fraud or abuse ·         Use social media to investigate individuals or online identities ·         Gather, extract, and analyze breach data with Cisco tools and techniques ·         Walk through common breaches and responses from start to finish ·         Choose the right tool for each task, and explore alternatives that might also be helpful   The professional’s go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You’ll learn how to make the most of today’s best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving intelligence, rooting out dormant malware, and responding effectively to breaches underway right now. This book is part of the Networking Technology: Security Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.    
Licens varighed:
Online udgaven er tilgængelig: 365 dage fra købsdato.
Offline udgaven er tilgængelig: 365 dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 1. Udgave
  • Vital Source leje e-bog 90 dage
  • Udgiver: Pearson International (Januar 2018)
  • Forfattere: Joseph Muniz og Aamir Lakhani
  • ISBN: 9780134755816R90
Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer ·         Understand the realities of cybercrime and today’s attacks ·         Build a digital forensics lab to test tools and methods, and gain expertise ·         Take the right actions as soon as you discover a breach ·         Determine the full scope of an investigation and the role you’ll play ·         Properly collect, document, and preserve evidence and data ·         Collect and analyze data from PCs, Macs, IoT devices, and other endpoints ·         Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence ·         Analyze iOS and Android devices, and understand encryption-related obstacles to investigation ·         Investigate and trace email, and identify fraud or abuse ·         Use social media to investigate individuals or online identities ·         Gather, extract, and analyze breach data with Cisco tools and techniques ·         Walk through common breaches and responses from start to finish ·         Choose the right tool for each task, and explore alternatives that might also be helpful   The professional’s go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You’ll learn how to make the most of today’s best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving intelligence, rooting out dormant malware, and responding effectively to breaches underway right now. This book is part of the Networking Technology: Security Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.    
Licens varighed:
Online udgaven er tilgængelig: 90 dage fra købsdato.
Offline udgaven er tilgængelig: 90 dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • Paperback: 464 sider
  • Udgiver: Cisco Press (Februar 2018)
  • Forfattere: Joseph Muniz, Aamir Lakhani og Ron Taylor
  • ISBN: 9781587145025
Investigating the Cyber Breach

The Digital Forensics Guide for the Network Engineer


- Understand the realities of cybercrime and today's attacks

- Build a digital forensics lab to test tools and methods, and gain expertise

- Take the right actions as soon as you discover a breach

- Determine the full scope of an investigation and the role you'll play

- Properly collect, document, and preserve evidence and data

- Collect and analyze data from PCs, Macs, IoT devices, and other endpoints

- Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence

- Analyze iOS and Android devices, and understand encryption-related obstacles to investigation

- Investigate and trace email, and identify fraud or abuse

- Use social media to investigate individuals or online identities

- Gather, extract, and analyze breach data with Cisco tools and techniques

- Walk through common breaches and responses from start to finish

- Choose the right tool for each task, and explore alternatives that might also be helpful


The professional's go-to digital forensics resource for countering attacks right now

Today, cybersecurity and networking professionals know they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that.

Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You'll learn how to make the most of today's best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more.


Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving intelligence, rooting out dormant malware, and responding effectively to breaches underway right now.



This book is part of the Networking Technology: Security Series from Cisco Press(R), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Introduction
xix
Chapter 1 Digital Forensics 1 Defining Digital Forensics 3 Engaging Forensics Services 4 Reporting Crime 7 Search Warrant and Law 9 Forensic Roles 13 Forensic Job Market 15 Forensic Training 16 Summary 23 References 24
Chapter 2 Cybercrime and Defenses 25 Crime in a Digital Age 27 Exploitation 31 Adversaries 34 Cyber Law 36 Summary 39 Reference 39
Chapter 3 Building a Digital Forensics Lab 41 Desktop Virtualization 42 VMware Fusion 43 VirtualBox 44 Installing Kali Linux 44 Attack Virtual Machines 52 Cuckoo Sandbox 56 Virtualization Software for Cuckoo 58 Installing TCPdump 58 Creating a User on VirtualBox for Cuckoo 59 Binwalk 60 The Sleuth Kit 61 Cisco Snort 62 Windows Tools 67 Physical Access Controls 68 Storing Your Forensics Evidence 71 Network Access Controls 72 Jump Bag 74 Summary 74 References 75
Chapter 4 Responding to a Breach 77 Why Organizations Fail at Incident Response 78 Preparing for a Cyber Incident 80 Defining Incident Response 81 Incident Response Plan 82 Assembling Your Incident Response Team 84 When to Engage the Incident Response Team 85 Outstanding Items that Often Get Missed with Incident Response 88 Phone Tree and Contact List 88 Facilities 89 Responding to an Incident 89 Assessing Incident Severity 91 Following Notification Procedures 92 Employing Post-Incident Actions and Procedures 93 Identifying Software Used to Assist in Responding to a Breach 93 Trend Analysis Software 94 Security Analytics Reference Architectures 94 Other Software Categories 97 Summary 97 References 98
Chapter 5 Investigations 99 Pre-Investigation 100 Opening a Case 102 First Responder 105 Device Power State 110 Search and Seizure 113 Chain of Custody 118 Network Investigations 121 Forensic Reports 127 Case Summary 129 Example 129 Acquisition and Exam Preparation 129 Example 129 Findings 130 Example 130 Conclusion 130 Example 131 List of Authors 131 Example 131 Closing the Case 132 Critiquing the Case 136 Summary 139 References 139
Chapter 6 Collecting and Preserving Evidence 141 First Responder 141 Evidence 144 Autopsy 145 Authorization 147 Hard Drives 148 Connections and Devices 150 RAID 152 Volatile Data 153 DumpIt 154 LiME 154 Volatility 156 Duplication 158 dd 161 dcfldd 161 ddrescue 162 Netcat 162 Guymager 163 Compression and Splitting 164 Hashing 166 MD5 and SHA Hashing 168 Hashing Challenges 169 Data Preservation 170 Summary 172 References 172
Chapter 7 Endpoint Forensics 173 File Systems 174 Locating Data 178 Unknown Files 180 Windows Registry 182 Deleted Files 185 Windows Recycle Bin 187 Shortcuts 189 Printer Spools 190 Slack Space and Corrupt Clusters 191 Alternate Data Streams 196 Mac OS X 198 OS X Artifacts 199 Log Analysis 202 IoT Forensics 207 Summary 210 References 211
Chapter 8 Network Forensics 213 Network Protocols 214 Security Tools 215 Firewall 219 Intrusion Detection and Prevention System 219 Content Filter 219 Network Access Control 220 Packet Capturing 223 NetFlow 224 Sandbox 225 Honeypot 226 Security Information and Event Manager (SIEM) 228 Threat Analytics and Feeds 229 Security Tool Summary 229 Security Logs 229 Network Baselines 233 Symptoms of Threats 235 Reconnaissance 235 Exploitation 238 Malicious Behavior 242 Beaconing 244 Brute Force 249 Exfiltration 250 Other Indicators 254 Summary 255 References 255
Chapter 9 Mobile Forensics 257 Mobile Devices 258 Investigation Challenges 258 iOS Architecture 259 iTunes Forensics 261 iOS Snapshots 263 How to Jailbreak the iPhone 265 Android 266 PIN Bypass 270 How to Brute Force Passcodes on the Lock Screen 271 Forensics with Commercial Tools 272 Call Logs and SMS Spoofing 274 Voicemail Bypass 275 How to Find Burner Phones 276 SIM Card Cloning 278 Summary 279 Reference 279
Chapter 10 Email and Social Media 281 A Message in a Bottle 281 Email Header 283 Social Media 288 People Search 288 Google Search 293 Facebook Sea
De oplyste priser er inkl. moms

Polyteknisk Boghandel

har gennem mere end 50 år været studieboghandlen på DTU og en af Danmarks førende specialister i faglitteratur.

 

Vi lagerfører et bredt udvalg af bøger, ikke bare inden for videnskab og teknik, men også f.eks. ledelse, IT og meget andet.

Læs mere her


Trykt eller digital bog?

Ud over trykte bøger tilbyder vi tre forskellige typer af digitale bøger:

 

Vital Source Ebog: En velfungerende ebogsplatform, hvor bogen downloades til din computer og/eller mobile enhed.

 

Du skal bruge den gratis Bookshelf software til at læse læse bøgerne - der er indbygget gode værktøjer til f.eks. overstregning, notetagning mv. I langt de fleste tilfælde vil du samtidig have en sideløbende 365 dages online adgang. Læs mere om Vital Source bøger

 

Levering: I forbindelse med købet opretter du et login. Når du har installeret Bookshelf softwaren, logger du blot ind og din bog downloades automatisk.

 

 

Adobe ebog: Dette er Adobe DRM ebøger som downloades til din lokale computer eller mobil enhed.

 

For at læse bøgerne kræves særlig software, som understøtter denne type. Softwaren er gratis, men du bør sikre at du har rettigheder til installere software på den maskine du påtænker at anvende den på. Læs mere om Adobe DRM bøger

 

Levering: Et download link sendes pr email umiddelbart efter købet.

 


Ibog: Dette er en online bog som kan læses på udgiverens website. 

Der kræves ikke særlig software, bogen læses i en almindelig browser.

 

Levering: Vores medarbejder sender dig en adgangsnøgle pr email.

 

Vi gør opmærksom på at der ikke er retur/fortrydelsesret på digitale varer.