- Learning Network Forensics
- Samir Datt
- 110字
- 2021-07-16 12:58:51
Summary
Our journey into the realm of network forensics has begun. We started out by identifying the characteristics that would make us 007 in the network forensics world. This was followed by learning about the TAARA methodology for investigations. We also learned about the various threats to an enterprise while strengthening our technical fundamentals. By the end of the chapter, we deepened our understanding of network security as well as network forensics.
In the next chapter, we will learn how to identify the different sources of evidence that are essential for a network forensic investigation. We will also learn how to collect and safely handle the evidence. So...let's get started!!!
推薦閱讀
- Functional Python Programming
- ASP.NET Core 5.0開發(fā)入門與實(shí)戰(zhàn)
- Cross-platform Desktop Application Development:Electron,Node,NW.js,and React
- 羅克韋爾ControlLogix系統(tǒng)應(yīng)用技術(shù)
- Learn Swift by Building Applications
- Essential Angular
- R大數(shù)據(jù)分析實(shí)用指南
- 微服務(wù)架構(gòu)深度解析:原理、實(shí)踐與進(jìn)階
- Learning R for Geospatial Analysis
- Mastering HTML5 Forms
- OpenCV 3.0 Computer Vision with Java
- ROS機(jī)器人編程實(shí)戰(zhàn)
- 3D Printing Designs:The Sun Puzzle
- HTML5程序設(shè)計(jì)基礎(chǔ)教程
- Practical Responsive Typography