Chapter 8. Network Forensics
After reading this chapter, you will be able to understand the following:
The importance of network forensics;
Hardware devices that contain network logs that are valuable to a forensics examiner;
IPv4 and IPv6;
The OSI Model;
Mistakes made when investigating networks;
Advanced persistent threats: ...