- Learning Network Forensics
- Samir Datt
- 110字
- 2021-07-16 12:58:51
Summary
Our journey into the realm of network forensics has begun. We started out by identifying the characteristics that would make us 007 in the network forensics world. This was followed by learning about the TAARA methodology for investigations. We also learned about the various threats to an enterprise while strengthening our technical fundamentals. By the end of the chapter, we deepened our understanding of network security as well as network forensics.
In the next chapter, we will learn how to identify the different sources of evidence that are essential for a network forensic investigation. We will also learn how to collect and safely handle the evidence. So...let's get started!!!
推薦閱讀
- Django+Vue.js商城項目實戰(zhàn)
- 數(shù)據(jù)庫原理及應用(Access版)第3版
- Apache Karaf Cookbook
- QGIS:Becoming a GIS Power User
- Mastering ServiceNow(Second Edition)
- HTML5+CSS3網(wǎng)頁設(shè)計
- Symfony2 Essentials
- Hands-On JavaScript for Python Developers
- OpenCV 3 Blueprints
- App Inventor少兒趣味編程動手做
- 玩轉(zhuǎn).NET Micro Framework移植:基于STM32F10x處理器
- Building Slack Bots
- 嵌入式C編程實戰(zhàn)
- Java Web開發(fā)基礎(chǔ)與案例教程
- 計算機系統(tǒng)解密:從理解計算機到編寫高效代碼