Coverart for item
The Resource Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response, Joe Fichera, Steven Bolt, (electronic book)

Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response, Joe Fichera, Steven Bolt, (electronic book)

Label
Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response
Title
Network intrusion analysis
Title remainder
methodologies, tools, and techniques for incident analysis and response
Statement of responsibility
Joe Fichera, Steven Bolt
Creator
Contributor
Subject
Language
eng
Summary
Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full operation. Network Intrusion Analysis teaches the reader about the various tools and techniques to use during a network intrusion investigation. The book focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns. This is the first book that provides such a thorough analysis of network intrusion investigation and response. Network Intrusion Analysis addresses the entire process of investigating a network intrusion by: Providing a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion. Providing real-world examples of network intrusions, along with associated workarounds. Walking you through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation. Network Intrusion Analysis addresses the entire process of investigating a network intrusion. Provides a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion. Provides real-world examples of network intrusions, along with associated workarounds. Walks readers through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation
Cataloging source
OPELS
http://library.link/vocab/creatorDate
1966-
http://library.link/vocab/creatorName
Fichera, Joe
Dewey number
005.8
Index
index present
LC call number
TK5105.59
LC item number
.F53 2012
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
Bolt, Steven
http://library.link/vocab/subjectName
  • Computer networks
  • Computer networks
  • Computer crimes
Label
Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response, Joe Fichera, Steven Bolt, (electronic book)
Instantiates
Publication
Note
Includes index
Antecedent source
unknown
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Control code
SCIDI815518159
Dimensions
unknown
Extent
1 online resource.
File format
unknown
Form of item
online
Isbn
9781597499620
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
Label
Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response, Joe Fichera, Steven Bolt, (electronic book)
Publication
Note
Includes index
Antecedent source
unknown
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Control code
SCIDI815518159
Dimensions
unknown
Extent
1 online resource.
File format
unknown
Form of item
online
Isbn
9781597499620
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote

Library Locations

Processing Feedback ...