|
![]() |
|||
|
||||
OverviewNetwork forensics is an evolution of typical digital forensics, in which evidence is gathered from network traffic in near real time. This book will help security and forensics professionals as well as network administrators build a solid foundation of processes and controls to identify incidents and gather evidence from the network. Forensic scientists and investigators are some of the fastest growing jobs in the United States with over 70,000 individuals employed in 2008. Specifically in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10,000 qualified specialists. Almost every technology company has developed or is developing a cloud computing strategy. To cut costs, many companies are moving toward network-based applications like SalesForce.com, PeopleSoft, and HR Direct. Every day, we are moving companies’ proprietary data into a cloud, which can be hosted anywhere in the world. These companies need to understand how to identify where their data is going and what they are sending. Full Product DetailsAuthor: Terrence V. Lillard ((Linux+, CISSP)) , Craig Schiller , Clint P GarrisonPublisher: Syngress Media,U.S. Imprint: Syngress Media,U.S. Dimensions: Width: 19.10cm , Height: 1.90cm , Length: 23.50cm Weight: 0.630kg ISBN: 9781597495370ISBN 10: 1597495379 Pages: 368 Publication Date: 02 July 2010 Audience: College/higher education , Tertiary & Higher Education Format: Paperback Publisher's Status: Unknown Availability: Awaiting stock ![]() Table of ContentsPART I INTRODUCTION CHAPTER 1 What Is Network Forensics? PART II GATHERING EVIDENCE CHAPTER 2 Capturing Network Traffic CHAPTER 3 Other Network Evidence PART III ANALYZING EVIDENCE WITH OPEN SOURCE SOFTWARE CHAPTER 4 Deciphering a TCP Header CHAPTER 5 Using Snort for Network-Based Forensics PART IV COMMERCIAL NETWORK FORENSICS APPLICATIONS CHAPTER 6 Commercial NetFlow Applications CHAPTER 7 NetWitness Investigator CHAPTER 8 SilentRunner by AccessData PART V MAKING YOUR NETWORK FORENSICS CASE CHAPTER 9 Incorporating Network Forensics into Incident Response Plans CHAPTER 10 Legal Implications and Considerations CHAPTER 11 Putting It All Together PART VI THE FUTURE OF NETWORK FORENSICS CHAPTER 12 The Future of Cloud Computing CHAPTER 13 The Future of Network ForensicsReviewsSyngress [is] by far the best publisher of digital forensics and general security books.I would strongly recommend that you read Digital Forensics for Network, Internet and Cloud Computing.as this book really does cover a plethora of issues that we'll all have to face, maybe sooner than we think. -Tony Campbell, Publisher, Digital Forensics Magazine Author InformationTerrence V. Lillard (Linux+, CISSP) is an IT Security architect and cybercrime and cyberforensics expert. He is actively involved in computer, intrusion, network, and steganography cybercrime and cyberforensics cases, including investigations, security audits, and assessments both nationally and internationally. Terrence has testified in U.S. District Court as a Computer Forensics/Security Expert Witness. He has designed and implemented security architectures for various government, military, and multi-national corporations. Terrence's background includes positions as principal consultant at Microsoft, the IT Security Operations manager for the District of Columbia's government IT Security Team, and instructor at the Defense Cyber Crime Center's (DC3) Computer Investigation Training Academy Program. He has taught IT security and cybercrime/cyberforensics at the undergraduate and graduate level.He holds a B.S. in Electrical Engineering, Master of Business Administration (MBA), and is currently pursuing a Ph.D. in Information Security. Clint P. Garrison has over 16 years experience in Law Enforcement and Information SystemsSecurity. Clint started his career working for a small police department near Austin Texas in1995, and moved on as a Sergeant Investigator for the Texas Department of Insurance InsurerFraud Unit’s Major Case Team. His primary responsibilities included investigating major financialfraud cases and digital forensics.Clint is currently an IT Security Consultant for a fortune 100 company where his primaryresponsibility is to ensure his company’s security compliance posture with numerous globalsecurity standards. He is also responsible for maintaining the incident response process toensure timely and effective responses to potential breaches of company systems.Certifications and Degrees:• Adjunct instructor, teaching a Cyber Crimes and Information System Security class forthe University of Phoenix’s online graduate program in Criminal Justice• BS in Administration of Criminal Justice from Mountain State University• MBA in Information Assurance and MS in Information Technology from the University ofDallas• CISSP• Master Peace Officer’s License and Peace Officer Instructor License Tab Content 6Author Website:Countries AvailableAll regions |