官术网_书友最值得收藏!

Technical Concepts and Acquiring Evidence

In the previous chapter, we learned about the various types of evidence sources. In this chapter, we will look at those sources in detail. We will familiarize ourselves with the basics of different types of log formats and look at the various technical key concepts required to conduct a network forensics exercise successfully.

We will cover the following topics in this chapter:

  • Inter-networking refresher
  • Exposure to various types of logs
  • Case studies on logs and packet structures

So, let's get started with the basics of inter-networking and understand how communications take place with respect to the OSI networking model.

主站蜘蛛池模板: 台南市| 千阳县| 万年县| 石景山区| 田林县| 宁晋县| 天台县| 甘南县| 洛浦县| 石嘴山市| 邹城市| 扎兰屯市| 呼玛县| 柳江县| 莱西市| 阳原县| 太白县| 宁蒗| 南通市| 名山县| 全椒县| 佛冈县| 井陉县| 高密市| 井陉县| 东海县| 南康市| 永兴县| 凤冈县| 高阳县| 西吉县| 灵台县| 南华县| 罗甸县| 孝感市| 丰原市| 揭东县| 灯塔市| 伊宁县| 翁牛特旗| 荃湾区|