×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
     

Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

by Joe Fichera, Steven Bolt, Jeffrey Naylor
 

See All Formats & Editions

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it’s imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the

Overview

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it’s imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full operation.

Network Intrusion Analysis teaches the reader about the various tools and techniques to use during a network intrusion investigation. The book focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns. This is the first book that provides such a thorough analysis of network intrusion investigation and response.

Network Intrusion Analysis addresses the entire process of investigating a network intrusion by: *Providing a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion. *Providing real-world examples of network intrusions, along with associated workarounds. *Walking you through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation.

  • Network Intrusion Analysis addresses the entire process of investigating a network intrusion
  • Provides a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion
  • Provides real-world examples of network intrusions, along with associated workarounds
  • Walks readers through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation

Editorial Reviews

From the Publisher
"Not only does this book teach you about network intrusion analysis, it also givesyou knowledge of how intrusions are performed. This inside information helps give you a better picture of what's really going on when you areinvestigating a compromise." —Derrick Rountree, CISSP, CASP, MCSE

Product Details

ISBN-13:
9781597499620
Publisher:
Elsevier Science
Publication date:
11/22/2012
Pages:
252
Product dimensions:
7.40(w) x 9.10(h) x 0.70(d)

Related Subjects

Meet the Author

Joe Fichera is a Sr. Consultant for a global corporation. He is a former computer forensic leader, instructor and curriculum developer for to the Defense Cyber Investigations Training Academy. He holds the following certifications; CISSP, EnCE, EnCEP, CCE, ACE, CTT+, SCNS, A+, Network+, and MCP certifications.

Steven Bolt is currently a Sr. Incident Response and Forensics Team Leader for a global corporation. Previously he worked as a Security Operations Center Manager and as a Computer Forensics Leader, Instructor and course developer at the Defense Cyber Investigations Training Academy. He holds several industry certifications.

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews