- Hands-On Network Forensics
- Nipun Jaswal
- 104字
- 2021-06-24 16:04:21
Technical Concepts and Acquiring Evidence
In the previous chapter, we learned about the various types of evidence sources. In this chapter, we will look at those sources in detail. We will familiarize ourselves with the basics of different types of log formats and look at the various technical key concepts required to conduct a network forensics exercise successfully.
We will cover the following topics in this chapter:
- Inter-networking refresher
- Exposure to various types of logs
- Case studies on logs and packet structures
So, let's get started with the basics of inter-networking and understand how communications take place with respect to the OSI networking model.
推薦閱讀
- RESTful Java Web Services Security
- 開發者的Web安全戒律:真實威脅與防御實踐
- .NET安全攻防指南(上冊)
- 網絡安全三十六計:人人該懂的防黑客技巧
- Mastering Reverse Engineering
- 網絡安全態勢感知
- 數據保護:工作負載的可恢復性
- 復雜信息系統網絡安全體系建設指南
- 計算機網絡安全實驗指導
- 黑客攻擊與防范實戰從入門到精通
- Learn Azure Sentinel
- Kali Linux無線網絡滲透測試詳解
- Blockchain Development with Hyperledger
- 企業安全建設入門:基于開源軟件打造企業網絡安全
- 數據安全實踐:能力體系、產品實現與解決方案