• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Fundamentals of network forensics :

پدید آورنده

موضوع
Computer crimes-- Investigation.,Computer networks-- Security measures.,Cyber intelligence (Computer security)

رده
TK5105
.
59

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
144717299X
(Number (ISBN
9781447172994
Erroneous ISBN
1447172973
Erroneous ISBN
9781447172970

NATIONAL BIBLIOGRAPHY NUMBER

Number
dltt

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Fundamentals of network forensics :
General Material Designation
[Book]
Other Title Information
a research perspective

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource

CONTENTS NOTE

Text of Note
Preface; Introduction; Audience; Organization of the Book; Tools; Acknowledgements; Contents; Part I Fundamentals; 1 Network Forensics; 1.1 Introduction; 1.2 Definition of Network Forensics; 1.3 Classification of Network Forensic Systems; 1.4 Motivation; 1.5 Recent Trends in Network Forensics; 1.6 Challenges in Network Forensic Analysis; 1.7 Conclusion; 1.8 Questions; References; 2 Network Forensic Process Models; 2.1 Digital Forensic Process Models; 2.2 Hierarchical Process Model; Preparation; Incident Response Phase; Data Collection Phase; Data Analysis Phase; Presentation of Findings Phase
Text of Note
4 Network Forensic Tools4.1 Introduction; 4.2 Network Forensic Analysis Tools (NFAT); NetDetector; NetIntercept; OmniPeek; Python Forensic Log Analysis GUI (PyFLAG); Xplico; 4.3 Vulnerability Assessment Tools; Metasploit; Nessus; Nikto; Yersinia; Wikto; Acunetix Web Vulnerability Scanner; 4.4 Network Sniffing and Packet Analyzing Tools; Wireshark; Aircrack-ng; WebScarab; ngrep; NetworkMiner; Kismet; eMailTrackerPro; 4.5 Network Scanning Tools; Nmap; Angry IP Scanner; Wireless Network Watcher; 4.6 Network Monitoring Tools; IPTraf; VisualRoute; Ntop; TCPStat
Text of Note
4.7 Intrusion Detection Systems (IDS)Snort; Bro; 4.8 Conclusion; 4.9 Questions; References; Part II Techniques; 5 Network Forensic Acquisition; 5.1 TCP/IP Protocol Suite; 5.2 Packet Capture Format; 5.3 pcapng Dump File Format; 5.4 NetFlow Record Format; 5.5 Internet Protocol Flow Information Export (IPFIX) Format; 5.6 Conclusion; 5.7 Questions; References; 6 Network Forensic Analysis; 6.1 Misuse Detection; 6.1.1 Naive Bayes; 6.1.2 Decision Tree; 6.1.3 Nearest Neighbor; 6.1.4 Back Propagation Neural Network; 6.1.5 Support Vector Machine; 6.2 Anomaly Detection; 6.2.1 Self-Organizing Map
Text of Note
6.2.2 Apriori Algorithm6.2.3 K-Means Clustering; 6.2.4 Genetic Algorithm; 6.2.5 DBSCAN; 6.3 Conclusion; 6.4 Questions; Short-Answer Questions; Long-Answer Questions; References; 7 Network Forensic Attribution; 7.1 Probabilistic Packet Marking; 7.2 Deterministic Packet Marking; 7.3 Autonomous System-Based Traceback; 7.4 Router and Interface Marking; 7.5 Network Forensic Traceback; 7.6 Conclusion; 7.7 Questions; References; Part III Advances; 8 Botnet Forensics; 8.1 Introduction; 8.2 Botnets Forensics; 8.3 Acquisition; 8.4 Analysis; Spam-Based Analysis
Text of Note
Incident Closure Phase2.3 Network Forensic Process Models; 2.4 Generic Process Model for Network Forensics; Preparation; Detection; Incident Response; Collection; Preservation; Examination; Analysis; Investigation; Presentation; 2.5 Conclusion; 2.6 Questions; References; 3 Network Forensic Frameworks; 3.1 Distributed Systems-Based Frameworks; 3.2 Soft Computing-Based Frameworks; 3.3 Honeynet-Based Frameworks; 3.4 Attack Graph-Based Frameworks; 3.5 Formal Method-Based Frameworks; 3.6 Aggregation-Based Frameworks; 3.7 Data Mining-Based Frameworks; 3.8 Conclusion; 3.9 Questions; References
0
8
8
8
8

OTHER EDITION IN ANOTHER MEDIUM

International Standard Book Number
9781447172970

TOPICAL NAME USED AS SUBJECT

Computer crimes-- Investigation.
Computer networks-- Security measures.
Cyber intelligence (Computer security)

DEWEY DECIMAL CLASSIFICATION

Number
004

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TK5105
.
59

PERSONAL NAME - PRIMARY RESPONSIBILITY

Joshi, R. C.

CORPORATE BODY NAME - ALTERNATIVE RESPONSIBILITY

Ohio Library and Information Network.

ORIGINATING SOURCE

Date of Transaction
20161209095707.8
Cataloguing Rules (Descriptive Conventions))
rda

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival