Normal view MARC view ISBD view

Investigating the Cyber Breach : the digital forensics guide for the network engineer / Joseph Muniz, Aamir Lakhani.

By: Muniz, Joseph [author.].
Contributor(s): Lakhani, Aamir [author.].
Publisher: Indianapolis, Indiana : Cisco Press, ©2018Description: xx, 444 pages : illustrations; 24 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9781587145025.Subject(s): Information technology -- Security measures | Computer security -- Management | Computer networks -- Security measures | Data protectionGenre/Form: Print books.
Contents:
Today, cybersecurity professionals recognize that they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they happen. Investigating The Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working networking and security professionals, senior cybersecurity experts Joseph Muñiz and Aamir Lakhani show exactly how to hunt attackers, track their movements within networks, and halt their data exfiltration and thefts of intellectual property. Muñiz and Lakhani show how to use tools ranging from open source software to enterprise solutions: tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike previous digital forensics books focused primarily on collecting evidence for later prosecution, this one focuses on using digital forensics tools to hunt threats, improve threat intelligence, root out dormant malware, and respond quickly and effectively to network compromises happening right now. -- Provided by publisher.
Summary: Breach detection is one of the hottest topics in cyber security. As more devices become Internet capable, more systems become targets. This in turn increases the need for digital defenses meaning the intended audience will continue to grow and expand across all business sectors. This book is a guide for various levels of technical competencies. Business minded people and executives would benefit from the incident response and policy content. Network administrators will benefit from the breach detection best practices content. Security experts will benefit from the technical forensics tools and exercises. Unlike the very few books on this topic, this book will be developed as a guide that can be easily applied to any organisation's business practice.
    average rating: 0.0 (0 votes)
Current location Call number Status Date due Barcode Item holds
On Shelf TK5105.59 .M966 2018 (Browse shelf) Available AU00000000013283
Total holds: 0

Includes bibliographical references.

Today, cybersecurity professionals recognize that they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they happen. Investigating The Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working networking and security professionals, senior cybersecurity experts Joseph Muñiz and Aamir Lakhani show exactly how to hunt attackers, track their movements within networks, and halt their data exfiltration and thefts of intellectual property. Muñiz and Lakhani show how to use tools ranging from open source software to enterprise solutions: tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike previous digital forensics books focused primarily on collecting evidence for later prosecution, this one focuses on using digital forensics tools to hunt threats, improve threat intelligence, root out dormant malware, and respond quickly and effectively to network compromises happening right now. -- Provided by publisher.

Breach detection is one of the hottest topics in cyber security. As more devices become Internet capable, more systems become targets. This in turn increases the need for digital defenses meaning the intended audience will continue to grow and expand across all business sectors. This book is a guide for various levels of technical competencies. Business minded people and executives would benefit from the incident response and policy content. Network administrators will benefit from the breach detection best practices content. Security experts will benefit from the technical forensics tools and exercises. Unlike the very few books on this topic, this book will be developed as a guide that can be easily applied to any organisation's business practice.

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu