Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer � Understand the realities of cybercrime and today's attacks � Build a digital forensics lab to test tools and methods, and gain expertise � Take the right actions as soon as you discover a breach � Determine the full scope of an investigation and the role you'll play � Properly collect, document, and preserve evidence and data � Collect and analyze data from PCs, Macs, IoT devices, and other endpoints � Use packet logs ...
Read More
Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer � Understand the realities of cybercrime and today's attacks � Build a digital forensics lab to test tools and methods, and gain expertise � Take the right actions as soon as you discover a breach � Determine the full scope of an investigation and the role you'll play � Properly collect, document, and preserve evidence and data � Collect and analyze data from PCs, Macs, IoT devices, and other endpoints � Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence � Analyze iOS and Android devices, and understand encryption-related obstacles to investigation � Investigate and trace email, and identify fraud or abuse � Use social media to investigate individuals or online identities � Gather, extract, and analyze breach data with Cisco tools and techniques � Walk through common breaches and responses from start to finish � Choose the right tool for each task, and explore alternatives that might also be helpful The professional's go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You'll learn how to make the most of today's best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving intelligence, rooting out dormant malware, and responding effectively to breaches underway right now. This book is part of the Networking Technology: Security Series from Cisco Press�, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Read Less
Add this copy of Investigating the Cyber Breach: the Digital Forensics to cart. $2.96, good condition, Sold by Goodwill rated 4.0 out of 5 stars, ships from Brooklyn Park, MN, UNITED STATES, published 2018 by Cisco Press.
Add this copy of Investigating the Cyber Breach: the Digital Forensics to cart. $2.98, good condition, Sold by ThriftBooks-Atlanta rated 5.0 out of 5 stars, ships from Austell, GA, UNITED STATES, published 2018 by Cisco Press.
Add this copy of Investigating the Cyber Breach: the Digital Forensics to cart. $3.35, very good condition, Sold by BooksRun rated 4.0 out of 5 stars, ships from Philadelphia, PA, UNITED STATES, published 2018 by Cisco Press.
Add this copy of Investigating the Cyber Breach: the Digital Forensics to cart. $5.00, good condition, Sold by HPB-Red rated 5.0 out of 5 stars, ships from Dallas, TX, UNITED STATES, published 2018 by Cisco Press.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or limited writing/highlighting. We ship orders daily and Customer Service is our top priority!
Add this copy of Investigating the Cyber Breach: the Digital Forensics to cart. $5.00, fair condition, Sold by HPB-Red rated 5.0 out of 5 stars, ships from Dallas, TX, UNITED STATES, published 2018 by Cisco Press.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Fair. Connecting readers with great books since 1972. Used textbooks may not include companion materials such as access codes, etc. May have condition issues including wear and notes/highlighting. We ship orders daily and Customer Service is our top priority!
Add this copy of Investigating the Cyber Breach: the Digital Forensics to cart. $31.50, new condition, Sold by discount_scientific_books rated 5.0 out of 5 stars, ships from Sterling Heights, MI, UNITED STATES, published 2018 by Cisco Press.
Add this copy of Investigating the Cyber Breach: the Digital Forensics to cart. $33.26, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Santa Clarita, CA, UNITED STATES, published 2018 by Cisco Press.
Add this copy of Investigating the Cyber Breach: The Digital Forensics to cart. $38.21, like new condition, Sold by GreatBookPrices rated 4.0 out of 5 stars, ships from Columbia, MD, UNITED STATES, published 2018 by Cisco Press.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Fine. Trade paperback (US). Glued binding. 464 p. In Stock. 100% Money Back Guarantee. Brand New, Perfect Condition, allow 4-14 business days for standard shipping. To Alaska, Hawaii, U.S. protectorate, P.O. box, and APO/FPO addresses allow 4-28 business days for Standard shipping. No expedited shipping. All orders placed with expedited shipping will be cancelled. Over 3, 000, 000 happy customers.