官术网_书友最值得收藏!

Technical Concepts and Acquiring Evidence

In the previous chapter, we learned about the various types of evidence sources. In this chapter, we will look at those sources in detail. We will familiarize ourselves with the basics of different types of log formats and look at the various technical key concepts required to conduct a network forensics exercise successfully.

We will cover the following topics in this chapter:

  • Inter-networking refresher
  • Exposure to various types of logs
  • Case studies on logs and packet structures

So, let's get started with the basics of inter-networking and understand how communications take place with respect to the OSI networking model.

主站蜘蛛池模板: 兴山县| 拉萨市| 灵丘县| 克东县| 鹿泉市| 巨鹿县| 调兵山市| 禄丰县| 本溪市| 永登县| 阿克陶县| 许昌县| 米易县| 邵东县| 白河县| 德州市| 定结县| 昆明市| 定陶县| 盐城市| 喜德县| 剑河县| 荥阳市| 龙游县| 澄城县| 眉山市| 延津县| 乌鲁木齐市| 鄂伦春自治旗| 桂阳县| 香港| 海丰县| 兴义市| 余姚市| 昂仁县| 临漳县| 沂源县| 剑阁县| 乐亭县| 玛曲县| 清镇市|