Professional >> Engineering and Computer Science >> Computer Science >> Computer Science


Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer

Investigating the Cyber Breach:   The Digital Forensics Guide for the Network Engineer

Author(s):
  • Joseph Muniz
  • Aamir Lakhani
  • Author: Joseph Muniz
    • ISBN:9789353068462
    • 10 Digit ISBN:9353068460
    • Price:Rs. 900.00
    • Pages:464
    • Imprint:Pearson Education
    • Binding:Paperback
    • Status:Available


    Be the first to rate the book !!

    Breach detection is one of the hottest topics in cyber security. As more devices become Internet capable, more systems become targets. This in turn increases the need for digital defenses meaning the intended audience will continue to grow and expand across all business sectors. This book is a guide for various levels of technical competencies. Business minded people and executives would benefit from the incident response and policy content. Network administrators will benefit from the breach detection best practices content. Security experts will benefit from the technical forensics tools and exercises. Unlike the very few books on this topic, this book will be developed as a guide that can be easily applied to any organization's business practice.

     

    Table of Content

    Chapter 1 Digital Forensics
    Chapter 2 Cybercrime and Defenses
    Chapter 3 Building a Digital Forensics Lab
    Chapter 4 Responding to a Breach
    Chapter 5 Investigations
    Chapter 6 Collecting and Preserving Evidence
    Chapter 7 Endpoint Forensics
    Chapter 8 Network Forensics
    Chapter 9 Mobile Forensics
    Chapter 10 Email and Social Media
    Chapter 11 Cisco Forensic Capabilities
    Chapter 12 Forensic Case Studies
    Chapter 13 Forensic Tools
     

    Salient Features

    This book will help administrators

    1) Understand how to identify when they are compromised.
    2) Improve their network security
    3) Develop a incident response plan
    4) Maximize security capabilities in existing investments
    5) Learn how to use critical digital forensics tools
    6) Understand best practices for digital forensics."