Mostrando 61 - 80 Resultados de 3,141 Para Buscar '"forense"', tiempo de consulta: 0.11s Limitar resultados
  1. 61
    Publicado 2017
    Tabla de Contenidos: “…Introduction xxi 1 Introduction to Network Forensics 1 What Is Forensics? 3 Handling Evidence 4 Cryptographic Hashes 5 Chain of Custody 8 Incident Response 8 The Need for Network Forensic Practitioners 10 Summary 11 References 12 2 Networking Basics 13 Protocols 14 Open Systems Interconnection (OSI) Model 16 TCP/IP Protocol Suite 18 Protocol Data Units 19 Request for Comments 20 Internet Registries 23 Internet Protocol and Addressing 25 Internet Protocol Addresses 28 Internet Control Message Protocol (ICMP) 31 Internet Protocol Version 6 (IPv6) 31 Transmission Control Protocol (TCP) 33 Connection-Oriented Transport 36 User Datagram Protocol (UDP) 38 Connectionless Transport 39 Ports 40 Domain Name System 42 Support Protocols (DHCP) 46 Support Protocols (ARP) 48 Summary 49 References 51 3 Host-Side Artifacts 53 Services 54 Connections 60 Tools 62 netstat 63 nbstat 66 ifconfi g/ipconfi g 68 Sysinternals 69 ntop 73 Task Manager/Resource Monitor 75 ARP 77 /proc Filesystem 78 Summary 79 4 Packet Capture and Analysis 81 Capturing Packets 82 Tcpdump/Tshark 84 Wireshark 89 Taps 91 Port Spanning 93 ARP Spoofi ng 94 Passive Scanning 96 Packet Analysis with Wireshark 98 Packet Decoding 98 Filtering 101 Statistics 102 Following Streams 105 Gathering Files 106 Network Miner 108 Summary 110 5 Attack Types 113 Denial of Service Attacks 114 SYN Floods 115 Malformed Packets 118 UDP Floods 122 Amplifi cation Attacks 124 Distributed Attacks 126 Backscatter 128 Vulnerability Exploits 130 Insider Threats 132 Evasion 134 Application Attacks 136 Summary 140 6 Location Awareness 143 Time Zones 144 Using whois 147 Traceroute 150 Geolocation 153 Location-Based Services 156 WiFi Positioning 157 Summary 158 7 Preparing for Attacks 159 NetFlow 160 Logging 165 Syslog 166 Windows Event Logs 171 Firewall Logs 173 Router and Switch Logs 177 Log Servers and Monitors 178 Antivirus 180 Incident Response Preparation 181 Google Rapid Response 182 Commercial Offerings 182 Security Information and Event Management 183 Summary 185 8 Intrusion Detection Systems 187 Detection Styles 188 Signature-Based 188 Heuristic 189 Host-Based versus Network-Based 190 Snort 191 Suricata and Sagan 201 Bro 203 Tripwire 205 OSSEC 206 Architecture 206 Alerting 207 Summary 208 9 Using Firewall and Application Logs 211 Syslog 212 Centralized Logging 216 Reading Log Messages 220 LogWatch 222 Event Viewer 224 Querying Event Logs 227 Clearing Event Logs 231 Firewall Logs 233 Proxy Logs 236 Web Application Firewall Logs 238 Common Log Format 240 Summary 243 10 Correlating Attacks 245 Time Synchronization 246 Time Zones 246 Network Time Protocol 247 Packet Capture Times 249 Log Aggregation and Management 251 Windows Event Forwarding 251 Syslog 252 Log Management Offerings 254 Timelines 257 Plaso 258 PacketTotal 259 Wireshark 261 Security Information and Event Management 262 Summary 263 11 Network Scanning 265 Port Scanning 266 Operating System Analysis 271 Scripts 273 Banner Grabbing 275 Ping Sweeps 278 Vulnerability Scanning 280 Port Knocking 285 Tunneling 286 Passive Data Gathering 287 Summary 289 12 Final Considerations 291 Encryption 292 Keys 293 Symmetric 294 Asymmetric 295 Hybrid 296 SSL/TLS 297 Cloud Computing 306 Infrastructure as a Service 306 Storage as a Service 309 Software as a Service 310 Other Factors 311 The Onion Router (TOR) 314 Summary 317 Index 319.…”
    Libro electrónico
  2. 62
    Publicado 2018
    Materias: “…Forensic oratory…”
    Libro electrónico
  3. 63
    Publicado 1949
    Libro
  4. 64
    Publicado 2008
    Materias: “…Química forense…”
    Accés restringit als usuaris de la UAB
    Libro
  5. 65
    por Roxo de Flores, Felipe
    Publicado 1793
    Accés Lliure
    Libro
  6. 66
    por Marcó Ribé, Jaime
    Publicado 1990
    Materias: “…Psiquiatria forense…”
    Libro
  7. 67
    por Jaumar y Carrera, Joaquín
    Publicado 1840
    Accés Lliure
    Libro
  8. 68
    Publicado 2021
    Materias: “…Forensic sciences Periodicals…”
    Revista digital
  9. 69
    Publicado 2008
    “…Revista Colombia forense…”
    Seriada digital
  10. 70
    Publicado 2016
    Materias: “…Chemistry, Forensic Periodicals…”
    Revista digital
  11. 71
    Publicado 2006
    Materias:
    Revista digital
  12. 72
    Publicado 2012
    Tabla de Contenidos: “…""EVIDENCE DOCUMENTATION, COLLECTION, AND PACKAGING""""CHAIN OF CUSTODY""; ""PHOTOGRAPHY AND VIDEOGRAPHY""; ""EXAMINATION AND DOCUMENTATION OF THE LIVE ANIMAL""; ""EXTERNAL EXAMINATION""; ""FORENSIC NECROPSY""; ""SPECIAL CONSIDERATIONS""; ""THE FORENSIC REPORT""; ""4 Special Considerations in Animal Cruelty Cases""; ""LARGE SCALE CRUELTY CASES""; ""TRACE EVIDENCE""; ""FORENSIC BOTANY""; ""DNA: DEOXYRIBONUCLEIC ACID""; ""ANIMAL DEATH/INJURY IN HUMAN SUSPICIOUS DEATH/INJURY CASES""; ""OTHER UNIQUE IDENTIFIERS OF ANIMALS""; ""MÜNCHAUSEN SYNDROME BY PROXY""; ""SUFFERING""; ""PAIN""…”
    Libro electrónico
  13. 73
    por Huffman, Jane E.
    Publicado 2011
    Tabla de Contenidos: “…Wildlife Forensics; Contents; Developments in Forensic Science; About the Editors; List of Contributors; Foreword; Acknowledgements; 1 Wildlife Ownership; Introduction; Ancient Rome and the Concept of Res Nullius; Common Law England: The King's Ownership; The New World: Hunting for the Market; Management: The Property Right of States; Federal Law and the Regulatory State; Globalization: Working toward Worldwide Conservation Practices; Conclusion; Cases Cited; References; 2 Society for Wildlife Forensic Science; Introduction; Formation of the Society; The Code of Ethics…”
    Libro electrónico
  14. 74
    Publicado 2013
    Materias:
    Video
  15. 75
    Publicado 2011
    Materias:
    Libro electrónico
  16. 76
    Publicado 2013
    Tabla de Contenidos: “…-- About the Series -- Lingo -- IMHO -- Budget Note -- In Actual Practice -- Your Plan -- Into Action -- Part I: Getting Started -- Chapter 1: What Is Computer Forensics? -- What You Can Do with Computer Forensics -- How People Get Involved in Computer Forensics -- Law Enforcement -- Military -- University Programs -- IT or Computer Security Professionals -- Incident Response vs. …”
    Libro electrónico
  17. 77
    Publicado 2016
    Tabla de Contenidos: “…Getdata packet Getdata packet data; TX packet; TX packet data; Summary; References; Chapter 2 - The key to forensic success: examination planning is a key determinant of efficient and effective digital forensics; Introduction; The four phases of digital forensics; It is a matter of questions; Investigative questions; Legal questions; Forensic questions; Identification; Classification/individualization; Association; Reconstruction; Forensic questions as a bridge; Developing forensic hypotheses; Knowing how far to go; Starting the plan; How do you know when you are done?…”
    Libro electrónico
  18. 78
    Materias:
    Revista digital
  19. 79
    Publicado 2018
    Tabla de Contenidos: “…Machine generated contents note: Preface List of Figures List of Tables List of Examples List of Definitions List of Abbreviations 1 Introduction 1 1.1 Forensic Science 1 1.2 Digital Forensics 4 1.3 Digital Evidence 7 1.4 Further Reading 9 1.5 Chapter Overview 10 1.6 Comments on Citation And Notation 11 2 The Digital Forensics Process 11 2.1 Introduction 12 2.2 The Identification Phase 16 2.3 The Collection Phase 24 2.4 The Examination Phase 35 2.5 The Analysis Phase 42 2.6 The Presentation Phase 47 2.7 Summary 50 2.8 Exercises 51 3 Cybercrime Law 54 3.1 Introduction 54 3.2 The International Legal Framework of Cybercrime Law 57 3.3 Digital Crime - Substantive Criminal Law 79 3.4 Investigation Methods for Collecting Digital Evidence 99 3.5 International Cooperation in Order to Collect Digital Evidence 113 3.6 Summary 119 3.7 Exercises 120 4 Digital Forensic Readiness 122 4.1 Introduction 122 4.2 Definition 122 4.3 Law Enforcement vs. …”
    Libro electrónico
  20. 80
    por Majada, Arturo
    Publicado 1962
    Libro