Network forensics / (Record no. 12457)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 08697cam a2200949 i 4500 |
001 - CONTROL NUMBER | |
control field | ocn994006202 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240523125540.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 170718s2017 inua ob 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | N$T |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | N$T |
Modifying agency | DG1 |
-- | YDX |
-- | N$T |
-- | IDEBK |
-- | EBLCP |
-- | OCLCF |
-- | OCLCQ |
-- | IUL |
-- | CNCGM |
-- | IDB |
-- | COO |
-- | UPM |
-- | K6U |
-- | UAB |
-- | DEBSZ |
-- | LIV |
-- | OCLCQ |
-- | DEBBG |
-- | D6H |
-- | OCLCQ |
-- | VVB |
-- | KSU |
-- | UMI |
-- | STF |
-- | CEF |
-- | VT2 |
-- | MERUC |
-- | RECBK |
-- | AU@ |
-- | OAUST |
-- | OCLCQ |
-- | WYU |
-- | LVT |
-- | U3W |
-- | OCLCQ |
-- | UKAHL |
-- | OCLCQ |
-- | UKMGB |
-- | OCLCQ |
-- | BRF |
-- | ELBRO |
-- | OCLCQ |
-- | OCLCO |
-- | SFB |
-- | OCLCQ |
-- | OCLCO |
-- | OCLCQ |
-- | OCLCL |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER | |
National bibliography number | GBB780941 |
Source | bnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER | |
Record control number | 018339668 |
Source | Uk |
019 ## - | |
-- | 994470187 |
-- | 995110295 |
-- | 995144993 |
-- | 1004966450 |
-- | 1048187388 |
-- | 1066633740 |
-- | 1103254670 |
-- | 1111104988 |
-- | 1129362939 |
-- | 1153017943 |
-- | 1192350388 |
-- | 1228549688 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119329176 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119329175 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119329190 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119329191 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119329183 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119329183 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781119328285 |
Qualifying information | (print) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 1119328284 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000061503310 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000062162513 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000062186323 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000062360973 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000066232163 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000066533269 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000067105626 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHBIS |
System control number | 011150720 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHNEW |
System control number | 000964913 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHVBK |
System control number | 495227781 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 493821449 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | GBVCP |
System control number | 1014934532 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | GBVCP |
System control number | 1014966779 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | UKMGB |
System control number | 018339668 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)994006202 |
Canceled/invalid control number | (OCoLC)994470187 |
-- | (OCoLC)995110295 |
-- | (OCoLC)995144993 |
-- | (OCoLC)1004966450 |
-- | (OCoLC)1048187388 |
-- | (OCoLC)1066633740 |
-- | (OCoLC)1103254670 |
-- | (OCoLC)1111104988 |
-- | (OCoLC)1129362939 |
-- | (OCoLC)1153017943 |
-- | (OCoLC)1192350388 |
-- | (OCoLC)1228549688 |
037 ## - SOURCE OF ACQUISITION | |
Stock number | CL0500000895 |
Source of stock number/acquisition | Safari Books Online |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.59 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 053000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Messier, Ric, |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Network forensics / |
Statement of responsibility, etc. | Ric Messier. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Indianapolis, IN : |
Name of producer, publisher, distributor, manufacturer | Wiley, |
Date of production, publication, distribution, manufacture, or copyright notice | 2017. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | �2017 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource : |
Other physical details | color illustrations |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Online resource; title from PDF title page (John Wiley, viewed July 25, 2017). |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover; Title Page; Copyright; About the Author; About the Technical Editor; Credits; Contents; Introduction; What This Book Covers; How to Use This Book; How This Book Is Organized; Chapter 1: Introduction to Network Forensics; What Is Forensics?; Handling Evidence; Cryptographic Hashes; Chain of Custody; Incident Response; The Need for Network Forensic Practitioners; Summary; References; Chapter 2: Networking Basics; Protocols; Open Systems Interconnection (OSI) Model; TCP/IP Protocol Suite; Protocol Data Units; Request for Comments; Internet Registries; Internet Protocol and Addressing. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Internet Protocol AddressesInternet Control Message Protocol (ICMP); Internet Protocol Version 6 (IPv6); Transmission Control Protocol (TCP); Connection-Oriented Transport; User Datagram Protocol (UDP); Connectionless Transport; Ports; Domain Name System; Support Protocols (DHCP); Support Protocols (ARP); Summary; References; Chapter 3: Host-Side Artifacts; Services; Connections; Tools; netstat; nbstat; ifconfig/ipconfig; Sysinternals; ntop; Task Manager/Resource Monitor; ARP; /proc Filesystem; Summary; Chapter 4: Packet Capture and Analysis; Capturing Packets; Tcpdump/Tshark; Wireshark; Taps. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Port SpanningARP Spoofing; Passive Scanning; Packet Analysis with Wireshark; Packet Decoding; Filtering; Statistics; Following Streams; Gathering Files; Network Miner; Summary; Chapter 5: Attack Types; Denial of Service Attacks; SYN Floods; Malformed Packets; UDP Floods; Amplification Attacks; Distributed Attacks; Backscatter; Vulnerability Exploits; Insider Threats; Evasion; Application Attacks; Summary; Chapter 6: Location Awareness; Time Zones; Using whois; Traceroute; Geolocation; Location-Based Services; WiFi Positioning; Summary; Chapter 7: Preparing for Attacks; NetFlow; Logging. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | SyslogWindows Event Logs; Firewall Logs; Router and Switch Logs; Log Servers and Monitors; Antivirus; Incident Response Preparation; Google Rapid Response; Commercial Offerings; Security Information and Event Management; Summary; Chapter 8: Intrusion Detection Systems; Detection Styles; Signature-Based; Heuristic; Host-Based versus Network-Based; Snort; Suricata and Sagan; Bro; Tripwire; OSSEC; Architecture; Alerting; Summary; Chapter 9: Using Firewall and Application Logs; Syslog; Centralized Logging; Reading Log Messages; LogWatch; Event Viewer; Querying Event Logs; Clearing Event Logs. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Firewall LogsProxy Logs; Web Application Firewall Logs; Common Log Format; Summary; Chapter 10: Correlating Attacks; Time Synchronization; Time Zones; Network Time Protocol; Packet Capture Times; Log Aggregation and Management; Windows Event Forwarding; Syslog; Log Management Offerings; Timelines; Plaso; PacketTotal; Wireshark; Security Information and Event Management; Summary; Chapter 11: Network Scanning; Port Scanning; Operating System Analysis; Scripts; Banner Grabbing; Ping Sweeps; Vulnerability Scanning; Port Knocking; Tunneling; Passive Data Gathering; Summary. |
520 8# - SUMMARY, ETC. | |
Summary, etc. | Intensively hands-on training for real-world network forensicsNetwork Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way--by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn-by-doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log analysis and beyond, this book emphasizes the critical techniques that bring evidence to light.Network forensics is a growing field, and is becoming increasingly central to law enforcement as cybercrime becomes more and more sophisticated. This book provides an unprecedented level of hands-on training to give investigators the skills they need. Investigate packet captures to examine network communicationsLocate host-based artifacts and analyze network logsUnderstand intrusion detection systems--and let them do the legworkHave the right architecture and systems in place ahead of an incidentNetwork data is always changing, and is never saved in one place; an investigator must understand how to examine data over time, which involves specialized skills that go above and beyond memory, mobile, or data forensics. Whether you're preparing for a security certification or just seeking deeper training for a law enforcement or IT role, you can only learn so much from concept; to thoroughly understand something, you need to do it. Network Forensics provides intensive hands-on practice with direct translation to real-world application. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
Provenance (VM) [OBSOLETE] | Wiley Online Library: Complete oBooks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Internet |
General subdivision | Security measures. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | R�eseaux d'ordinateurs |
General subdivision | S�ecurit�e |
-- | Mesures. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Internet |
General subdivision | S�ecurit�e |
-- | Mesures. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS |
General subdivision | Security |
-- | General. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures |
Source of heading or term | fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Internet |
General subdivision | Security measures |
Source of heading or term | fast |
758 ## - RESOURCE IDENTIFIER | |
Relationship information | has work: |
Label | Network Forensics (Text) |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCFHxThdMJhW4c6cCbhcPry |
Relationship | https://id.oclc.org/worldcat/ontology/hasWork |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Messier, Ric. |
Title | Network forensics. |
Place, publisher, and date of publication | Indianapolis, IN : Wiley, 2017 |
International Standard Book Number | 1119328284 |
-- | 9781119328285 |
Record control number | (OCoLC)960091582 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a> |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH32066802 |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH32066801 |
938 ## - | |
-- | EBSCOhost |
-- | EBSC |
-- | 1556076 |
938 ## - | |
-- | eLibro |
-- | ELBO |
-- | ELB177224 |
938 ## - | |
-- | ProQuest MyiLibrary Digital eBook Collection |
-- | IDEB |
-- | cis36881926 |
938 ## - | |
-- | Recorded Books, LLC |
-- | RECE |
-- | rbeEB00737605 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 14700923 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 14723954 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 14712599 |
938 ## - | |
-- | ProQuest Ebook Central |
-- | EBLB |
-- | EBL4917496 |
994 ## - | |
-- | 92 |
-- | INLUM |
No items available.