0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 1 of 1 matches in All Departments

Network Intrusion Analysis - Methodologies, Tools, and Techniques for Incident Analysis and Response (Paperback): Joe Fichera,... Network Intrusion Analysis - Methodologies, Tools, and Techniques for Incident Analysis and Response (Paperback)
Joe Fichera, Steven Bolt
R1,547 Discovery Miles 15 470 Ships in 10 - 15 working days

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it s imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full operation.

"Network Intrusion Analysis" teaches the reader about the various tools and techniques to use during a network intrusion investigation. The book focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns. This is the first book that provides such a thorough analysis of network intrusion investigation and response.

"Network Intrusion Analysis" addresses the entire process of investigating a network intrusion by: *Providing a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion. *Providing real-world examples of network intrusions, along with associated workarounds. *Walking you through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation.

"Network Intrusion Analysis" addresses the entire process of investigating a network intrusion.

*Provides a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion.

*Provides real-world examples of network intrusions, along with associated workarounds.

*Walks readers through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Insectopedia - The Secret World of…
Erik Holm Paperback  (3)
R350 R296 Discovery Miles 2 960
Bantex B9875 A5 Record Card File Box…
 (1)
R125 R112 Discovery Miles 1 120
A Girl, A Bottle, A Boat
Train CD  (2)
R108 R48 Discovery Miles 480
ZA Tummy Control, Bust Enhancing…
R570 R399 Discovery Miles 3 990
LG 20MK400H 19.5" WXGA LED Monitor…
R2,199 R1,699 Discovery Miles 16 990
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Efekto Zero Snail Bait Pesticide (1kg)
R139 Discovery Miles 1 390
Microsoft Xbox Series Wireless…
R1,699 R1,589 Discovery Miles 15 890
Dune: Part 2
Timothee Chalamet, Zendaya, … DVD R221 Discovery Miles 2 210
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680

 

Partners