0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking

Buy Now

Cisco Router and Switch Forensics - Investigating and Analyzing Malicious Network Activity (Paperback, New) Loot Price: R1,332
Discovery Miles 13 320
Cisco Router and Switch Forensics - Investigating and Analyzing Malicious Network Activity (Paperback, New): Dale Liu

Cisco Router and Switch Forensics - Investigating and Analyzing Malicious Network Activity (Paperback, New)

Dale Liu

 (sign in to rate)
Loot Price R1,332 Discovery Miles 13 320 | Repayment Terms: R125 pm x 12*

Bookmark and Share

Expected to ship within 12 - 17 working days

Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. Compromised devices can disrupt stability, introduce malicious modification, and endanger all communication on the network. For security of the network and investigation of attacks, in-depth analysis and diagnostics are critical, but no book currently covers forensic analysis of Cisco network devices in any detail.
Cisco Router and Switch Forensics is the first book devoted to criminal attacks, incident response, data collection, and legal testimony on the market leader in network devices, including routers, switches, and wireless access points.
Why is this focus on network devices necessary? Because criminals are targeting networks, and network devices require a fundamentally different approach than the process taken with traditional forensics. By hacking a router, an attacker can bypass a network's firewalls, issue a denial of service (DoS) attack to disable the network, monitor and record all outgoing and incoming traffic, or redirect that communication anywhere they like. But capturing this criminal activity cannot be accomplished with the tools and techniques of traditional forensics. While forensic analysis of computers or other traditional media typically involves immediate shut-down of the target machine, creation of a duplicate, and analysis of static data, this process rarely recovers live system data. So, when an investigation focuses on live network activity, this traditional approach obviously fails. Investigators must recover data as it is transferred via the router or switch, because it is destroyed when the network device is powered down. In this case, following the traditional approach outlined in books on general computer forensics techniques is not only insufficient, but also essentially harmful to an investigation.
Jargon buster: A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). A router is a more sophisticated network device that joins multiple wired or wireless networks together.
* The only book devoted to forensic analysis of routers and switches, focusing on the operating system that runs the vast majority of network devices in the enterprise and on the Internet
* Outlines the fundamental differences between router forensics and traditional forensics, a critical distinction for responders in an investigation targeting network activity
* Details where network forensics fits within the entire process of an investigation, end to end, from incident response and data collection to preparing a report and legal testimony

General

Imprint: Syngress Media,U.S.
Country of origin: United States
Release date: June 2009
First published: May 2009
Authors: Dale Liu
Dimensions: 235 x 191 x 28mm (L x W x T)
Format: Paperback
Pages: 528
Edition: New
ISBN-13: 978-1-59749-418-2
Categories: Books > Computing & IT > Computer communications & networking > General
Promotions
LSN: 1-59749-418-6
Barcode: 9781597494182

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,704 R1,343 Discovery Miles 13 430
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,248 R1,109 Discovery Miles 11 090
Managing Business Projects - The…
Frank Einhorn Paperback R478 Discovery Miles 4 780
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,224 Discovery Miles 12 240
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,405 Discovery Miles 24 050
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,875 Discovery Miles 18 750
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,432 R1,187 Discovery Miles 11 870
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,859 Discovery Miles 18 590
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,351 Discovery Miles 13 510
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,490 Discovery Miles 14 900

See more

Partners