NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Network forensics / (Record no. 12457)

MARC details
000 -LEADER
fixed length control field 08697cam a2200949 i 4500
001 - CONTROL NUMBER
control field ocn994006202
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125540.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu|||unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170718s2017 inua ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency N$T
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency N$T
Modifying agency DG1
-- YDX
-- N$T
-- IDEBK
-- EBLCP
-- OCLCF
-- OCLCQ
-- IUL
-- CNCGM
-- IDB
-- COO
-- UPM
-- K6U
-- UAB
-- DEBSZ
-- LIV
-- OCLCQ
-- DEBBG
-- D6H
-- OCLCQ
-- VVB
-- KSU
-- UMI
-- STF
-- CEF
-- VT2
-- MERUC
-- RECBK
-- AU@
-- OAUST
-- OCLCQ
-- WYU
-- LVT
-- U3W
-- OCLCQ
-- UKAHL
-- OCLCQ
-- UKMGB
-- OCLCQ
-- BRF
-- ELBRO
-- OCLCQ
-- OCLCO
-- SFB
-- OCLCQ
-- OCLCO
-- OCLCQ
-- OCLCL
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB780941
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 018339668
Source Uk
019 ## -
-- 994470187
-- 995110295
-- 995144993
-- 1004966450
-- 1048187388
-- 1066633740
-- 1103254670
-- 1111104988
-- 1129362939
-- 1153017943
-- 1192350388
-- 1228549688
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119329176
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119329175
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119329190
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119329191
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119329183
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119329183
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781119328285
Qualifying information (print)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1119328284
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000061503310
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000062162513
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000062186323
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000062360973
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000066232163
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000066533269
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000067105626
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHBIS
System control number 011150720
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHNEW
System control number 000964913
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHVBK
System control number 495227781
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 493821449
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier GBVCP
System control number 1014934532
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier GBVCP
System control number 1014966779
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier UKMGB
System control number 018339668
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)994006202
Canceled/invalid control number (OCoLC)994470187
-- (OCoLC)995110295
-- (OCoLC)995144993
-- (OCoLC)1004966450
-- (OCoLC)1048187388
-- (OCoLC)1066633740
-- (OCoLC)1103254670
-- (OCoLC)1111104988
-- (OCoLC)1129362939
-- (OCoLC)1153017943
-- (OCoLC)1192350388
-- (OCoLC)1228549688
037 ## - SOURCE OF ACQUISITION
Stock number CL0500000895
Source of stock number/acquisition Safari Books Online
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Messier, Ric,
Relator term author.
245 10 - TITLE STATEMENT
Title Network forensics /
Statement of responsibility, etc. Ric Messier.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis, IN :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice 2017.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice �2017
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource :
Other physical details color illustrations
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from PDF title page (John Wiley, viewed July 25, 2017).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover; Title Page; Copyright; About the Author; About the Technical Editor; Credits; Contents; Introduction; What This Book Covers; How to Use This Book; How This Book Is Organized; Chapter 1: Introduction to Network Forensics; What Is Forensics?; Handling Evidence; Cryptographic Hashes; Chain of Custody; Incident Response; The Need for Network Forensic Practitioners; Summary; References; Chapter 2: Networking Basics; Protocols; Open Systems Interconnection (OSI) Model; TCP/IP Protocol Suite; Protocol Data Units; Request for Comments; Internet Registries; Internet Protocol and Addressing.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Internet Protocol AddressesInternet Control Message Protocol (ICMP); Internet Protocol Version 6 (IPv6); Transmission Control Protocol (TCP); Connection-Oriented Transport; User Datagram Protocol (UDP); Connectionless Transport; Ports; Domain Name System; Support Protocols (DHCP); Support Protocols (ARP); Summary; References; Chapter 3: Host-Side Artifacts; Services; Connections; Tools; netstat; nbstat; ifconfig/ipconfig; Sysinternals; ntop; Task Manager/Resource Monitor; ARP; /proc Filesystem; Summary; Chapter 4: Packet Capture and Analysis; Capturing Packets; Tcpdump/Tshark; Wireshark; Taps.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Port SpanningARP Spoofing; Passive Scanning; Packet Analysis with Wireshark; Packet Decoding; Filtering; Statistics; Following Streams; Gathering Files; Network Miner; Summary; Chapter 5: Attack Types; Denial of Service Attacks; SYN Floods; Malformed Packets; UDP Floods; Amplification Attacks; Distributed Attacks; Backscatter; Vulnerability Exploits; Insider Threats; Evasion; Application Attacks; Summary; Chapter 6: Location Awareness; Time Zones; Using whois; Traceroute; Geolocation; Location-Based Services; WiFi Positioning; Summary; Chapter 7: Preparing for Attacks; NetFlow; Logging.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note SyslogWindows Event Logs; Firewall Logs; Router and Switch Logs; Log Servers and Monitors; Antivirus; Incident Response Preparation; Google Rapid Response; Commercial Offerings; Security Information and Event Management; Summary; Chapter 8: Intrusion Detection Systems; Detection Styles; Signature-Based; Heuristic; Host-Based versus Network-Based; Snort; Suricata and Sagan; Bro; Tripwire; OSSEC; Architecture; Alerting; Summary; Chapter 9: Using Firewall and Application Logs; Syslog; Centralized Logging; Reading Log Messages; LogWatch; Event Viewer; Querying Event Logs; Clearing Event Logs.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Firewall LogsProxy Logs; Web Application Firewall Logs; Common Log Format; Summary; Chapter 10: Correlating Attacks; Time Synchronization; Time Zones; Network Time Protocol; Packet Capture Times; Log Aggregation and Management; Windows Event Forwarding; Syslog; Log Management Offerings; Timelines; Plaso; PacketTotal; Wireshark; Security Information and Event Management; Summary; Chapter 11: Network Scanning; Port Scanning; Operating System Analysis; Scripts; Banner Grabbing; Ping Sweeps; Vulnerability Scanning; Port Knocking; Tunneling; Passive Data Gathering; Summary.
520 8# - SUMMARY, ETC.
Summary, etc. Intensively hands-on training for real-world network forensicsNetwork Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way--by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn-by-doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log analysis and beyond, this book emphasizes the critical techniques that bring evidence to light.Network forensics is a growing field, and is becoming increasingly central to law enforcement as cybercrime becomes more and more sophisticated. This book provides an unprecedented level of hands-on training to give investigators the skills they need. Investigate packet captures to examine network communicationsLocate host-based artifacts and analyze network logsUnderstand intrusion detection systems--and let them do the legworkHave the right architecture and systems in place ahead of an incidentNetwork data is always changing, and is never saved in one place; an investigator must understand how to examine data over time, which involves specialized skills that go above and beyond memory, mobile, or data forensics. Whether you're preparing for a security certification or just seeking deeper training for a law enforcement or IT role, you can only learn so much from concept; to thoroughly understand something, you need to do it. Network Forensics provides intensive hands-on practice with direct translation to real-world application.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet
General subdivision Security measures.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element R�eseaux d'ordinateurs
General subdivision S�ecurit�e
-- Mesures.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet
General subdivision S�ecurit�e
-- Mesures.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Security
-- General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet
General subdivision Security measures
Source of heading or term fast
758 ## - RESOURCE IDENTIFIER
Relationship information has work:
Label Network Forensics (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCFHxThdMJhW4c6cCbhcPry
Relationship https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Messier, Ric.
Title Network forensics.
Place, publisher, and date of publication Indianapolis, IN : Wiley, 2017
International Standard Book Number 1119328284
-- 9781119328285
Record control number (OCoLC)960091582
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a>
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH32066802
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH32066801
938 ## -
-- EBSCOhost
-- EBSC
-- 1556076
938 ## -
-- eLibro
-- ELBO
-- ELB177224
938 ## -
-- ProQuest MyiLibrary Digital eBook Collection
-- IDEB
-- cis36881926
938 ## -
-- Recorded Books, LLC
-- RECE
-- rbeEB00737605
938 ## -
-- YBP Library Services
-- YANK
-- 14700923
938 ## -
-- YBP Library Services
-- YANK
-- 14723954
938 ## -
-- YBP Library Services
-- YANK
-- 14712599
938 ## -
-- ProQuest Ebook Central
-- EBLB
-- EBL4917496
994 ## -
-- 92
-- INLUM

No items available.

© 2022- NLU Meghalaya. All Rights Reserved. || Implemented and Customized by
OPAC Visitors

Powered by Koha