![](images/graphics/blank.gif)
Network forensic analysis
-
Ebook "Forensic computer crime investigation" includes contents: Chapter 1: computer crime and the electronic crime scene; chapter 2: the digital investigative unit: staffing, training, and issues; chapter 3: criminal investigation analysis and behavior: characteristics of computer criminals; chapter 4: investigative strategy and utilities; chapter 5: computer forensics & investigation: the training organization; chapter 6: internet crimes against children; chapter 7: challenges to digital forensic evidence; chapter 8: strategic aspects in international forensics; chapter 9: cyber terrorism...
338p
longtimenosee05
31-03-2024
3
0
Download
-
Ebook InDesign CS for macintosh and windows - Visual quickstart guide: Part 2 includes contents: Chapter 10 computer system storage fundamentals, chapter 11 data analysis techniques, chapter 12 investigating windows systems, chapter 13 investigating unix systems, chapter 14 analyzing network traffic, chapter 15 investigating hacker tools, chapter 16 investigating routers, chapter 17 writing computer forensic reports, appendix a answers to questions, appendix b incident response forms.
355p
longtimenosee05
31-03-2024
5
0
Download
-
Ebook Incident response & computer forensics (2nd Ed) - Part 2 includes contents: Chapter 10 computer system storage fundamentals, chapter 11 data analysis techniques, chapter 12 investigating windows systems, chapter 13 investigating unix systems, chapter 14 analyzing network traffic, chapter 15 investigating hacker tools, chapter 16 investigating routers, chapter 17 writing computer forensic reports, appendix a answers to questions, appendix b incident response forms.
300p
longtimenosee05
31-03-2024
5
0
Download
-
Ebook Penetration tester’s: Open source toolkit (Volume 2) – Part 2 includes contents: Chapter 6 network devices, chapter 7 customizing BackTrack 2, chapter 8 forensic discovery and analysis using backtrack, chapter 9 building penetration test labs.
246p
longtimenosee05
31-03-2024
0
0
Download
-
This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). My hope is that not only will consultants (such as myself) find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics.
221p
longtimenosee05
31-03-2024
1
0
Download
-
Ebook Physical logical security convergence: Powered by enterprise security management - Part 2 includes contents: Chapter 8 the new security model: the trusted enterprise; chapter 9 ESM architecture; chapter 10 log collection; chapter 11 real-time event correlation, analysis, and response; chapter 12 event storage and forensic analysis; chapter 13 bridging the chinese wall; chapter 14 physical and logical access; chapter 15 intelligent video analytics; chapter 16 environmental sensors; chapter 17 protecting critical infrastructure: process control and SCADA; chapter 18 final thoughts.
342p
longtimenosee05
31-03-2024
0
0
Download
-
This project is focused on study of active P2P nodes along with the analysis of the undocumented communication methods employed in many of these large unstructured networks. This is achieved through the design and implementation of an efficient P2P monitoring and crawling toolset.
193p
longtimenosee02
03-01-2024
5
3
Download
-
This research is focused on the calculation of the efficiency of the storage medium and the optimum point combination fingerprint length, degree of similarity and storage media.
8p
byphasse043256
23-03-2019
13
1
Download
-
(bq) this book include penetration testing with python, pennetration testing with python, forensic investigation with python, network trafic analysis with python.
269p
physicalfunny
29-08-2018
43
7
Download
-
Because this document is a benchmark, it does not cover the important requirements that cannot be benchmarked, such as requirements for integration with existing systems (agent vs. agent-less, transport mechanism, ports and protocols, interface with change control, usability of user interface, storage type, integration with physical security systems, etc.).
9p
giamdocamnhac
06-04-2013
44
5
Download
-
It not only provides an interface for traffic capture but also provides a rich platform for an in-depth analysis of the traffic. The GUI provides a very user friendly and interactive media that simplifies the process of network forensics. This concise book provides a perfect start to getting hands-on with packet analysis using Wireshark.
68p
titatu_123
01-03-2013
91
9
Download
-
IPS-1 is an intrusion prevention system (IPS) that delivers protection from a wide-range of network threats using an IPS-1 Sensor that can be placed either on the perimeter of your network or at any location in your internal network. Some of the benefits of IPS-1 include: Unified security management Mission-critical protection against known and unknown attacks Granular forensic analysis Flexible deployment Confidence Indexing
15p
hoangtumayman
20-08-2012
46
1
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)