咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Network Intrusion Analysis: Me... 收藏

Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

网络入侵分析:进行分析和事件响应方法、工具和技术

版本说明:1

作     者:Fichera, Joe Bolt, Steven 

I S B N:(纸本) 9781597499620 

出 版 社:Syngress_RM 

出 版 年:2012年

主 题 词:Computer Science and Technology 

学科分类:0839[工学-网络空间安全] 08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

摘      要:Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full operation. Network Intrusion Analysis teaches the reader about the various tools and techniques to use during a network intrusion investigation. The book focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns. This is the first book that provides such a thorough analysis of network intrusion investigation and response. Network Intrusion Analysis addresses the entire process of investigating a network intrusion by: *Providing a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion. *Providing real-world examples of network intrusions, along with associated workarounds. *Walking you through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and *** Intrusion Analysis addresses the entire process of investigating a network intrusionProvides a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusionProvides real-world examples of network intrusions, along with associated workaroundsWalks readers through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分