larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer

eBook (Watermarked)

  • Your Price: $31.99
  • List Price: $39.99
  • Estimated Release: Feb 9, 2018
  • About Watermarked eBooks
  • This PDF will be accessible from your Account page after purchase and requires the free Adobe® Reader® software to read it.

    The eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

    Watermarked eBook FAQ

  • Description
  • Sample Content
  • Updates
  • Copyright 2018
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 400
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-475586-3
  • ISBN-13: 978-0-13-475586-1

Today, cybersecurity professionals recognize that they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they happen. Investigating The Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working networking and security professionals, senior cybersecurity experts Joseph Muñiz and Aamir Lakhani show exactly how to hunt attackers, track their movements within networks, and halt their data exfiltration and thefts of intellectual property. Muñiz and Lakhani show how to use tools ranging from open source software to enterprise solutions: tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike previous digital forensics books focused primarily on collecting evidence for later prosecution, this one focuses on using digital forensics tools to hunt threats, improve threat intelligence, root out dormant malware, and respond quickly and effectively to network compromises happening right now.

Table of Contents

1. Cyber Crime and Defenses
2. Digital Forensics
3. Building a Lab
4. Investigations
5. Collecting and Preserving Evidence
6. Windows File Forensics
7. Network Forensics
8. Mobile Device and Web
9. Cisco Security Forensic Capabilities
10. Case Study and Wrap-Up

Unlimited one-month access with your purchase
Free Safari Membership